nac plus data sheet 2013 - nem technology

Upload: nem-technology-holding-company-llc

Post on 04-Jun-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 NAC Plus Data Sheet 2013 - NEM Technology

    1/5Copyright 2013, NetClarity, Inc. All rights reserved worldwide. NACwall, Inside-Out Network Security are NetClarity tradema

    Network Access Control

    iscover the worlds onlyplug n play NAC appliancesWithin minutes of set up, you can solve the BYODdilemma by automatically blocking any device from

    entering your network.

    NetClaritys NAC solutions are sized for your network and help yousolve the growing Bring Your Own Device (BYOD) trend.

    Learn More

    For more information on NetClarity products and services or to schedule an

    evaluation, contact NEM Technology at 877 739 2177.

    http://www.netclarity.net/http://www.netclarity.net/http://www.netclarity.net/
  • 8/13/2019 NAC Plus Data Sheet 2013 - NEM Technology

    2/5Copyright 2013, NetClarity, Inc. All rights reserved worldwide. NACwall, Inside-Out Network Security are NetClarity tradema

    The need for a convenient access control solution for the BYOD workplac

    Copyright 2013, NetClarity, Inc. All rights reserved worldwide. NACwall, Inside-Out Network Security are NetClarity tradema

    The BYOD trend is

    growing rapidly in

    the market.

    BYOD trend brings external threats insideOver 80% of all successful network security attacks originate behind th

    firewall. This continues to be fueled by a trend of employee-owned dev

    es in the workplace, which are inherently more difficult to manage, and

    more susceptible to malware.

    Heres how BYOD can pose a problem:

    Administrators lack the tools needed to give them both visibility an

    control over all assets accessing their network.

    Some have Mobile Device Management (MDM) or other endpoint

    software on those endpoints that support it and have it installed.

    This is helpful, but incomplete.

    NetClarity provides agentless discovery and control of the remainder as

    well as all internal network assets through a protocol manipulation tech

    nology by simply attaching it to a network.

    Traditional security solutions; dynamic threatsThe set-it-and-forget- it mindset that applied to firewalls and wireless

    security perimeters in the past is relatively ineffective in a BYOD work-

    place. Here, the security threats are far more dynamic, with employees

    inadvertently downloading malware by night and walking right past the

    firewall the next morning into the office and connecting to the secure

    wireless networks. Antivirus solutions, where installed, can help to mit

    gate this risk through continual monitoring, but are only partially effec-tive and not supported universally.

    NetClarity minimizes this risk by controlling access to all internal netwo

    devices and by assessing the health of these devices via its vulnerabili

    and malware detection engines.

    Growing demand for convenient accesscontrol solutionsAccess control solutions have historically been a nightmare to

    deploy, because they have depended upon one of the following

    actions:

    In line solutions: Re-architecting the network by placing theaccess control solution in-line with all network traffic, which

    administrators hesitate to do because of the potential of

    catastrophic downtime and the introduction of a new choke

    point into the network;

    Integrated solutions: Extensive integration with existing net-work infrastructure equipment like switches, RADIUS servers,

    and firewalls, which is time-consuming and likely not to workwith all equipment in heterogeneous networks;

    Agent based solutions: Using credentialed access to end-points or agents to be installed on endpoints, which means

    that only certain endpoints can be supported (e.g., windows

    devices, etc.), and this is also time consuming.

    These options strain IT resources and budgets todayparticularly

    in the midmarket, and are therefore impractical for effective man-

    agement of BYOD. Here the solution must be both universally

    applicable to all devices on the network, as well as seamless to

    deploy and manage. NetClarity solves all of the above actions by

    meeting the following requirements:

    NetClarity is not in line of network trafficNetClarity does not require any change to network infrastructureNetClarityis completely agentless

    A plug-n-play solution like NetClarity provides relief to both the

    implementation pain-point and the incomplete coverage pain-

    point through a fourth option: intelligent protocol manipulation.

  • 8/13/2019 NAC Plus Data Sheet 2013 - NEM Technology

    3/5Copyright 2013, NetClarity, Inc. All rights reserved worldwide. NACwall, Inside-Out Network Security are NetClarity tradema

    True agentless discovery and blocking

    NetClaritys philosophy is that in order for security to be prac-

    ticed, it must first be practical. By merely attaching the NetClarity

    appliance to the network requiring protection, you can immedi-

    ately discover all internal network assets and block untrusted

    devices at will. NetClarity is the only access control vendor that

    can accomplish this because our blocking technology is based

    on protocol manipulation, which means that it is universally ap-

    plicable and independent from agents, credentials, network in-

    frastructure equipment, OS or device type. It is both agentless

    and integrationless.

    Access control made simple with NetClarity

    A quick look at how NetClaritys solutions work in your network

    Multi-layered internal defense system

    In addition to blocking untrusted devices, our security appl

    ances proactively scan assets for common vulnerabilitie

    and exposures (CVEs) on a regular basis to help you proac

    tively manage your security posture. As a third layer of de

    fense, the appliance integrates its malware detection en

    gine with the blocking engine so that asset blocking can b

    automatically triggered if evidence of malware traffic is de

    tected via a port mirror from the core switch.

    Firewalls are no longer enough

    to protect from threats stemming

    from inside the network.

    Copyright 2013, NetClarity, Inc. All rights reserved worldwide. NACwall, Inside-Out Network Security are NetClarity tradema

    NetClaritys proprietary blocking technology enables it to immediately block untrusted devices without depend-

    ence upon any integration with network infrastructure or agents. Detection and blocking are immediate.

  • 8/13/2019 NAC Plus Data Sheet 2013 - NEM Technology

    4/5

    Complete internal security with NetClarity

    Asset discovery, analysis, and control

    NetClaritys appliances are designed to protect your network fromthreats originating on the inside. Unauthorized devices connected

    to your network make your organization vulnerable to malware,

    viruses, and data theft. NetClaritys appliances detect, alert, and

    block unauthorized devices from connecting to your network.

    Vulnerability assessment

    NetClaritys vulnerability scanner helps you identify the most ur-

    gent patches needed to harden your network against attack. After

    you run scans, detailed reports alert you if an attached device has

    a problem, or you can simply block an asset if it fails a vulnerability

    scan. These are very helpful in complying with requirements man-dated by HIPAA/HITECH, PCI, GLBA, and other security standards.

    Zero-day malware protection

    Quarantine or block malware-infested PCseven zero-day malware

    that would otherwise go unchecked by standard virus-protection

    software. Or NetClarity can simply issue an alert and you can de-

    cide how to proceed with remediation.

    Subscription services

    NetClaritys cloud-based subscription service allows you to gain

    access to zero-day malware heuristic updates, CVE tests, asset

    fingerprint signatures, and firmware updates several times per day

    to keep you continually protected in real-time.

    Copyright 2013, NetClarity, Inc. All rights reserved worldwide. NACwall, Inside-Out Network Security are NetClarity tradema

    RISKprofiler allows you to see a snapshot of your network and th

    threats, vulnerabilities, and asset risk levels.

    The Manage Assets screen allows you to trust and untrustassets that are trying to gain access onto your network.

    The Command Center comes with all Enterprise appliances and

    allows you to manage branch or remote locations efficiently.The Differential Report gives you the abili ty to show auditors

    and executive management how your network posture has

    improved.

  • 8/13/2019 NAC Plus Data Sheet 2013 - NEM Technology

    5/5Copyright 2013, NetClarity, Inc. All rights reserved worldwide. NACwall, Inside-Out Network Security are NetClarity tradema

    Executive Summary: NetClarity can help solve the BYOD dilemma withconvenient Network Access Control solutions

    Todays BYOD dilemma is fundamentally an access control dilemma, and a universally applicable

    seamless product like NetClarity needs to be at the core of the solution. Antivirus and Mobile Device

    Management software can complement and add depth overall, but from a security perspective a first

    line of defense is needed. NetClarity becomes that line in the internal network by giving administrators

    instant agentless visibility and access control over all devices. Its core technologies provide multiple

    defense layers, and most importantly, a seamless access control solution in a world where NAC has

    previously been dismissed because of cost and complexity.

    NetClarity is an emerging leader in access control products and

    technology because of our deployment-in-minutes architecture. We sellour software pre-packaged on industry-standard network appliances into a

    variety of verticals in the mid-market segment. Our solutions capitalize on

    two significant industry trends: the exponentially increasing threats to

    networks from malware, cyber criminals in tandem with a rapid increase

    in the number of employee-owned mobile wireless devices in the

    workplace (BYOD); and the need to demonstrate that networks are in

    compliance with regulatory agencies.

    NetClarity sells its products and services through channel partners

    worldwide.

    About NetClarity

    The NetClarity core NACfunctionality is augmentedthrough two additionaldefense layers: proactivevulnerability managementand malware detection.

    About NEM Technology

    NEM Technology is a company that is focused on k

    you connected to everything. Integrating voice, vide

    data solutions for the small to midsize marketplace

    Technology provides technology planning, insta

    maintenance, and managed services throughout the

    of Michigan. For more information on securing

    networks, contact NEM Technology at 877-739-2177.

    mailto:[email protected]://www.twitter.com/netclarityhttp://www.twitter.com/netclarityhttp://www.facebook.com/netclarityhttp://www.linkedin.com/company/130511?trk=tyahhttp://www.netclarity.net/http://www.linkedin.com/company/130511?trk=tyahhttp://www.facebook.com/netclarityhttp://www.twitter.com/netclaritymailto:[email protected]