Products

NAC - Network Access Control

Ensure full network surveillance for all IP-enabled devices and provides dynamic access control to maintain compliance with IT security policies. It then leverages automation to orchestrate an organization’s entire security portfolio in concert with NAC to achieve an optimally secure network access environment.

Trusted. Seamless. Secure — Everywhere.

Genian NAC enables practical security compliance by providing real-time visibility into all network-connected assets, ensuring they adhere to your IT security policies. Without disrupting your existing infrastructure or affecting system availability, it continuously collects and monitors hardware and software information from all IP-enabled devices.

Using its Device Platform Intelligence, Genian NAC identifies each device’s technical and business context, detects known or potential vulnerabilities, defines appropriate user access levels, and ensures full compliance across the network.

Our approach

FEATURES

Genians’ Next-Gen NAC provides any organization with the most essential cybersecurity features and functionalities to keep network assets safe and secure. Without disturbing existing operations, Genians’ Next-Gen NAC ensures full network surveillance for all network-enabled devices and provides dynamic access control to maintain compliance with IT security policies. It then leverages automation to orchestrate an organization’s entire security portfolio in concert with NAC to achieve an optimally secure network access environment.
Network Surveillance

Genian NAC can monitor IP-enabled devices on your network in real-time using a non-disruptive Layer 2 based Network Sensor and classifies those devices and their users into logical groups based on your business requirements. Genian NAC has the intelligence to sort out a wide range of network-connected devices and their states to present immediate, meaningful, and actionable information.

Device Platform Intelligence

“Device Platform” refers to any hardware or software, or any combination of hardware and software (OS), used to access a network. Genian NAC incorporated with Device Platform Intelligence (DPI) can present the most accurate device identity, its contextual, and its risk information in order to enhance network visibility and secure network access for the IoT era. DPI can be shared through the Genians Cloud.

Network Access Control

Genian NAC leverages multiple techniques to enforce IT security policies dynamically using contextual information (What, Who, When, Where, How) to quarantine any non-compliant devices and remediate them to be compliant through automated processes.

Mobile, BYOD, Guest

In the hyper-connected world of the Internet of Things (IoT), organizations are grappling with implementing Bring Your Own Device (BYOD) initiatives to deal with the rapidly evolving and increasingly complex tsunami of mobile devices, from laptops and tablets to other smart ”Things”, such as phones, watches, cars and more. Genian NAC can provide flexible and secure network access, wherever you are located, and for whatever devices you bring to the network.

IP Address Management

Through our intuitive IP matrix interface (Class C Subnet mask), see how many IP addresses are being used and available, which IP’s are assigned via DHCP, which are reserved, and more.

Switch Port Management

See how many devices are connected to specific ports, their connection status, port-level security, 802.1x information, traffic, utilization and more. Using 802.1x port-based access control, control any ports connected to non-compliant devices.

WLAN Security

Genians’ Network Sensor has the capability of scanning all SSIDs in your network and identifying who connects to which SSIDs, capturing not only your organization’s APs but also neighboring APs and controlling what is connecting to those APs. You can allow or deny Wifi-enabled devices accessing different SSIDs based on their policy compliance by groups, such as Authorized AP, Rogue AP, Misconfigured AP, Tethering device, and more.

Endpoint Security​

Manage all desktop configurations, applications, OS Updates, peripheral devices, wireless connections and more. Standardize the configuration of corporate-owned devices automatically and control them remotely.

IT Security Automation

Genian NAC integrates a wide range of IT security and business solutions (Firewall, VPN, IDS/IPS, VM, MDM, SIEM, APT, DLP, CRM/ERP, etc.) to ensure unified policy enforcement. Genian NAC supports custom integration using Webhook, REST API, and Syslog.

COMPONENTS

Seamless Security. Zero Disruption

DPI Cloud
 
Review and refine device platform information via the cloud and deliver the most accurate, up-to-date device platform information to Policy Server on a weekly basis.
Policy Server
 
Establish security policies based on Node info collected by Network Sensors and Agents.
 
  • Distribute established policies to Network Sensors and Agents
  • Communicate with Network Sensors and Agents to secure access control
  • Integrate with user database and third-party security solutions
Network Sensor
 
Collect Node Information from network and enforce access control polices.
 
  • Apply (or enforce) established policies from Policy Server to targeted Node (or Node groups)
  • Detect all SSIDs by listening wifi signals
  • Identify who is accessing valid (enterprise-owned) APs, neighbor APs, or rogue APs
  • Support 802.1q Trunk Port
Agent (Optional)
 
Control endpoint system (all installed hardware and software) in detail
 
  • Execute policy enforcement as well as management tasks through the use of Plugins.
  • Operate as a Wireless Sensor to provide wider and more in-depth coverage to detect any possible Wifi activities such as Ad-hoc mode, SoftAP, and Tethering.