Use Cases

AGENTLESS VISIBILITY AND ENFORCEMENT

Easy NAC lets you see and control devices that join your network, without using agents. Immediately detect untrusted devices and restrict them from your network. Profile endpoints passively and actively, to determine operating system, manufacturer, and type of device.

For enforcement, Easy NAC uses ARP to restrict access to the network. ARP enforcement doesn’t require network changes and works with any network equipment, including unmanaged and managed switches.

 

 

 SATELLITE LOCATIONS AND REMOTE OFFICES

Easy NAC is idea for distributed organizations with many remote locations. Easy NAC handles hundreds of remote sites as easily as one. Its advanced technology easily and affordably scales to handle any number of remote sites.  

  • Supports NAT and overlapped subnet ranges

  • Is as compatible with consumer firewalls, routers and unmanaged switches as enterprise networks

  • No network changes or endpoint changes

 

AUTOMATED WHITE LISTING 

Keeping track of which devices are allowed on your network and which are not can be a never ending job.  Easy NAC takes the pain out of white listing by automating the process on the LAN and wireless.

Easy NAC communicates with your existing servers to authorize valid devices without manual intervention. Easy NAC restricts devices that should not be on the network and optionally notifies administrators. 

 

ANTI-SPOOFING PROTECTION

Easy NAC provides a fingerprint feature to protect against device spoofing.  Easy NAC records each device’s fingerprint through information collected from the device’s network, system, and configuration. This prevents attempts to spoof a device through means such as replicating a low-level MAC address. 

 

FIREWALL / ADVANCED PERSISTENT THREAT INTEGRATION

Security appliances that are designed to monitor devices and network traffic can send event-based alerts for administrative action.  Easy NAC can receive event-based email or syslog messages from all types for security devices and take immediate action when necessary. After receiving an alert that a device has malware, Easy NAC can immediately restrict it.

 

ENFORCE ANTI-VIRUS AND SECURITY POLICIES

With the ever increasing threats of zero day attacks, Advanced Persistent Threats, and ransomware it is more important than ever to verify endpoint security solutions are install, active and up-to-date.  Easy NAC integrates with enterprise Anti-Virus vendors and leading patch management solutions, to verify endpoint security is active and up-to-date. By integrating with leading security solutions, Easy NAC can enforce compliance with security policies, without the use of agents. Devices out-of-compliance can be restricted at the point of network access.

 

BYOD, GUEST, AND CONSULTANT REGISTRATION

Easy NAC provides multiple methods for organizations to automate the enrollment of BYOD, guests, and consultants. These range from self-registration to sponsor approved registrations to help organizations balance the need for security with guest convenience. Regardless of which method(s) is used the company remains in control of when, where, and how long the guest can connect to the network. Least privilege access policies can be set to limit guests to the internet and consultants to specific servers or network segments.

Deception – Hacking Detection

Easy NAC has a built-in distributed Honey Pot feature that can detect hacking activities on the entire network with near-zero false positives. The Easy NAC appliance has an IP address on every protected VLAN. Leveraging these IP addresses, the Easy NAC solution will offer fake SSH, telnet, and FTP services. If any device tries to access these fake services, we can immediately block the device and report the credentials used for the attempted breach.

 

logo-easynac-512
This website uses cookies to give you the best experience on our site. Your continued use indicates your consent.