Fortinet's FortiNAC is a network access control solution that provides visibility, control, and automated response for everything that connects to the network, enhancing the security fabric. FortiNAC protects against Internet of Things (IoT) threats, extends control to third-party devices, and orchestrates automated responses to a variety of networking events.
It's a subscription-based license, which is based on the usage and number of concurrent users.
The licensing fees are a little bit high.
It's a subscription-based license, which is based on the usage and number of concurrent users.
The licensing fees are a little bit high.
Forescout Platform provides today’s busy enterprise organizations with policy and protocol management, workflow coordination, streamlining, and complete device and infrastructure visibility to improve overall network security. The solution also provides concise real-time intelligence of all devices and users on the network. Policy and protocols are delineated using gathered intelligence to facilitate the appropriate levels of remediation, compliance, network access, and all service operations. Forescout Platform is very flexible, integrates well with most of today’s leading network security products, and is a very cost-effective solution.
Devices with multiple IP's count multiple times against your license count.
The ROI is priceless.
Devices with multiple IP's count multiple times against your license count.
The ROI is priceless.
Genians has re-imagined Network Access Control (NAC) to secure the entire lifecycle of all connected devices to your network for the world of IoT.
SafeConnect provides the ability to automate the enforcement of security compliance and network access control policies (based on identity, device type, location, and ownership), and gathers a wealth of real-time and historical context-aware device data so you can make more informed and intelligent decisions.
Through market-leading and patented technologies, Trustwave NAC enables granular control over network access and continuous monitoring of corporate-sanctioned and bring-your-own-device (BYOD) endpoints. This can help you to prevent the spread of malware and other threats that can harm infrastructure and leave your business vulnerable to attack and data loss.
Tempered Airwall leverages the Host Identity Protocol (HIP), a ratified open standard network security protocol recognized possibly the next big change in IP architecture. HIP enables a paradigm shift in networking that solves the broken trust model in IP networking by separating the role of an IP address as both host identity and location, where hosts are identified using permanent, location-independent cryptographic identities (CID). Now security is built-in from the beginning with verifiable authentication and end-to-end encryption.
MetaAccess prevents risky devices from accessing local networks and cloud applications such as Office 365, Salesforce and Dropbox. Using OPSWAT’s industry-leading endpoint security and advanced threat prevention technologies, MetaAccess performs extensive security and compliance checks as well as remediation before allowing devices to access corporate data.