GENIAN NAC

NETWORK ACCESS CONTROL

Device Platform Intelligence

“Device Platform” refers to any hardware or software, or any combination of hardware and software (OS), used to access a network. Genian NAC incorporated with Device Platform Intelligence (DPI) can present the most accurate device identity, its contextual, and its risk information in order to enhance network visibility and secure network access for the IoT era. DPI can be shared through the Genians Cloud.

Identity

  • Distinct information
    • The name of Device Platform consists of manufacturer, device name, model number (Integrated with the Common Platform Enumeration (CPE) dictionary)
    • The actual picture of the device platforms
    • The list of device fingerprinting sources
    • Network connection type (Wired, Wireless) 
    • Released Date

Context

  • Business Information
    • Product end of life (EOL)
    • Product end of support (EOS)
    • Manufacturer business status
    • Manufacturer location (Country)
    • Manufacturer homepage
  • Extended Information
    • Linked to Product webpage
    • Linked to Google search engine

Risk

  • Technology Vulnerability
    • Provide Common Vulnerabilities and Exposures (CVE)
    • Report device platforms exposed to vulnerability issues in real time
    • Alert and notification
  • Business Vulnerability
    • Report manufacturer/vendor going out of business or being acquired, which can introduce systems that cannot be upgraded or patched

Mobile, BYOD, Guest

In the hyper-connected world of the Internet of Things (IoT), organizations are grappling with implementing Bring Your Own Device (BYOD) initiatives to deal with the rapidly evolving and increasingly complex tsunami of mobile devices, from laptops and tablets to other smart ”Things”, such as phones, watches, cars and more. Genian NAC can provide flexible and secure network access, wherever you are located, and for whatever devices you bring to the network.

Onboarding Process

  • Check user authentication and device compliance status
  • Guide users to meet compliance (Self-service process)
  • Provide role-based access control

Secure Access Request

  • Captive Web Portal service
  • Built-in RADIUS server (802.1x)
  • User authentication (AD, local DB, RDBMS, Google G-Suite)
  • Request approval system (Device, IP, User, Peripherals)

Switch Port Management

See how many devices are connected to specific ports, their connection status, port-level security, 802.1x information, traffic, utilization and more. Using 802.1x port-based access control, control any ports connected to non-compliant devices.

Monitoring

  • Identify how many devices are connected to specific ports
  • Check the authentication status of connected devices
  • Monitor Switch port status (Up/down, Security, 802.1x, VLAN, etc.)

Port Management

  • Switch and Port Description
  • Administratively Down
  • Discover Top 10 Switch Port Traffics

Endpoint Security​

Manage all desktop configurations, applications, OS Updates, peripheral devices, wireless connections and more. Standardize the configuration of corporate-owned devices automatically and control them remotely.

  • Change Computer Name
  • Check Password Validation
  • Collect System Information Using WMI
  • Configure Windows Security Settings
  • Control OS Updates (Works for the isolated network)
  • Configure 802.1X Wired Authentication
  • Profile Settings
  • Control Antivirus Software Settings
  • Control DNS
  • Control External Devices (e.g. USB, Printer)
  • Control Internet Explorer Security Settings
  • Control Network Folder Sharing / Interface / Traffic
  • Control Power Options, Screen Lock
  • Provide Wireless Connection Manager (Zero configuration)
  • Control WLAN
  • Deploy Files
  • Inspect TCP Connections
  • Manage ARP Table
  • Install / Remove software
  • Run Scripts
  • Terminate Processes