Managed Network Access Control


Network Access Control - As a Managed Service & Cloud-Based Service


Managed Network Access Control Services


Rapidly utilise Network Access Control from a Cloud hosting provider without capital or resource investments. 

> Secures Access to Cloud, Mobile, and On-premise apps



Solutions

1. Managed service (service provide hosts and provide full management of systems and support)

2. Hosted service (hardware and software hosted by a provide, but management and control by you – service provider offers 24x7 support)



Managed Network Access Control (NAC), you can rely upon a team of security experts to obtain proactive management, maintenance and monitoring to keep your network, systems and data safe. 



Features & Benefits


> Cloud-Based NAC (Network Access Control)


> Full-featured NAC solution
Complete visibility and control over who and what is accessing wired / wireless networks. 



> No capital expense  

The only pure-cloud NAC solution available today that requires no equipment on-site. 


> Highly scalable  

Out of band architecture, hosted by secure partner network, reliable enterprise-class infrastructure.


> Secure communication  

Between the corporate networks and the cloud infrastructure is via a highly secure VPN connection. Perimeter firewalls, intrusion detection systems, network monitoring and Denial of Service (DoS) protection all ensure the highest degree of network defence.


> Complete security  

Network Sentry does not capture or store any data traversing a network, and no organisational data is stored in the cloud.


> Supports customers’ existing environments  

Seamlessly integrates with customers’ existing network infrastructure.


> Integrates with existing BYOD ecosystem technologies
Seamlessly integrates with leading security, mobile management, and wired / wireless vendor solutions to provide complete and secure solutions for BYOD.


> Supports compliance 
An easy and cost-effective solution for compliance with PCI, HIPAA, SOX and other regulations.


> Improved threat prevention

via automated detection and restriction of non-compliant devices based on device type, vulnerability assessment, potentially malicious behavior or infection.


> Centralised management 

Administers and monitors all devices and policies from a central console.



Identity and Policy Based Network Access Control


> Remove the risk of identity silos

> Ensure only authorised employees, customers, and partners can access your systems and applications.


  • Identity life-cycle management 
  • Includes privileged user account management
  • Authentication (prevents attackers using stolen credentials, because only the authorised used can access using credentials and using a unique passcode generation on something they have or know)
  • Full-featured NAC solution
Complete visibility and control over who and what is accessing wired / wireless networks.

  • Encrypted tunnel sessions / segmentation
Prevent unauthorised network connections/access

Server segmentation technology (IP Sec) that enables computer systems to locally require authentication prior to communication at the network layer to ensure that only authorized systems are allowed access.

This solution provides logical isolation to ensure that sensitive systems can only be accessed from other authorised computers. 



  • Directory Management
Access and store your domain credentials in Active Directory or LDAP, in the cloud or any combination (Windows and Mac).





Account Management

Provision user access to the right apps access based on role, manage new device authorisation and on boarding, and revoke access when users leave - all from a single source: Active Directory, LDAP or cloud identity store.




Signal Sign-On (SSO)
  • No more forgotten passwords.
  • One click access to your on-premises, mobile and cloud applications.









Application Access Control

 


Privilege User Access

IT admins, both internal and outsourced, need to login from inside and outside of the corporate perimeter (cloud-based or data centre).

  • Manage Access
  • Password Management (and retirement)


Authentication Management

Prevents attackers using stolen credentials, because only the authorised used can access using credentials and using a unique passcode generation on something they have or know.

Leverage your users’ mobile devices as a second factor for app authentication. SMS, email, voice or secure OTP.




Mobile Device / BYOD Management

Manage user identity and the devices trying to access your network, apps and data.

Integrated mobile device and identity management can push apps, policy, certificates and more — and pull it all back when devices are lost or stolen. 





Wireless Access Management

Solutions provide enterprise-class reliability and performance and works with cloud-enabled access points to deliver 30 percent lower upfront costs with a pay-as-you-use cloud-service model and offers 100 percent up-time in case of WAN-link failures. 




Log & Audit

Search by user, role, or app. See login locations, devices used, failed logins, and more. Monitor user access across all your apps - centrally.


  • Identity and policy based network access control
  • Managed collaboration
  • Wireless Access management
  • Managed networks
  • Network intrusion prevention
  • SSL / VPN
  • Privilege user access
  • Password management



Contact us today to discuss your requirements in more detail.



P: +44(0)7714 209927

S: +44(0)1273 329753

info@securenetconsulting.co.uk