Use Cases

AGENTLESS VISIBILITY AND ENFORCEMENT

Easy NAC lets you see and control devices that join your network, without using agents. Immediately detect untrusted devices and restrict them from your network. Profile endpoints passively and actively, to determine operating system, manufacturer, and type of device.

For enforcement, Easy NAC uses ARP to restrict access to the network. ARP enforcement doesn’t require network changes and works with any network equipment, including unmanaged and managed switches.

 

 

 SATELLITE LOCATIONS AND REMOTE OFFICES

Easy NAC is idea for distributed organizations with many remote locations. Easy NAC handles hundreds of remote sites as easily as one. Its advanced technology easily and affordably scales to handle any number of remote sites.  

  • Supports NAT and overlapped subnet ranges

  • Is as compatible with consumer firewalls, routers and unmanaged switches as enterprise networks

  • No network changes or endpoint changes

 

AUTOMATED WHITE LISTING 

Keeping track of which devices are allowed on your network and which are not can be a never ending job.  Easy NAC takes the pain out of white listing by automating the process on the LAN and wireless.

Easy NAC communicates with your existing servers to authorize valid devices without manual intervention. Easy NAC restricts devices that should not be on the network and optionally notifies administrators. 

 

ANTI-SPOOFING PROTECTION

Easy NAC provides a fingerprint feature to protect against device spoofing.  Easy NAC records each device’s fingerprint through information collected from the device’s network, system, and configuration.  This prevents attempts to spoof a device through means such as replicating its low level address. 

 

FIREWALL / ADVANCED PERSISTENT THREAT INTEGRATION

Security appliances that are designed to monitor devices and network traffic can send event-based alerts for administrative action.  Easy NAC can receive event-based syslog messages from all types for security devices and take immediate action when necessary. After receiving an alert that a device has malware, Easy NAC can immediately restrict it.

 

ENFORCE ANTI-VIRUS AND SECURITY POLICIES

With the ever increasing threats of zero day attacks, Advanced Persistent Threats, and ransomware it is more important than ever to verify endpoint security solutions are install, active and up-to-date.  Easy NAC integrates with enterprise Anti-Virus vendors and leading patch management solutions, to verify endpoint security is active and up-to-date. By integrating with leading security solutions, Easy NAC can enforce compliance with security policies, without the use of agents. Devices out-of-compliance can be restricted at the point of network access.

 

BYOD REGISTRATION

Keeping track of which Bring Your Own Device belongs to who is a difficult task. Controlling which devices can connect when and where is even more difficult.  Easy NAC makes the process of enrolling and controlling BYOD devices simple.  Easy NAC provides employees with a self-registration captive portal to register their device with their directory credentials.  Administrators can set policies to enforce and control BYOD. Simple policies can be set to limit the user(s), device quantities, device types, allowed network locations, allowed network resources, and more.

 

GUEST AND CONSULTANT REGISTRATION

Easy NAC provides multiple methods for organizations to automate the enrollment of guests and consultants. These range from self-registration to sponsor approved registrations to help organizations balance the need for security with guest convenience. Regardless of which method(s) is used the company remains in control of when, where, and how long the guest can connect to the network. Role-based access policies can be set to limit guests to the internet and consultants to specific servers or network segments.