nac plus data sheet 2013 - nem technology
TRANSCRIPT
-
8/13/2019 NAC Plus Data Sheet 2013 - NEM Technology
1/5Copyright 2013, NetClarity, Inc. All rights reserved worldwide. NACwall, Inside-Out Network Security are NetClarity tradema
Network Access Control
iscover the worlds onlyplug n play NAC appliancesWithin minutes of set up, you can solve the BYODdilemma by automatically blocking any device from
entering your network.
NetClaritys NAC solutions are sized for your network and help yousolve the growing Bring Your Own Device (BYOD) trend.
Learn More
For more information on NetClarity products and services or to schedule an
evaluation, contact NEM Technology at 877 739 2177.
http://www.netclarity.net/http://www.netclarity.net/http://www.netclarity.net/ -
8/13/2019 NAC Plus Data Sheet 2013 - NEM Technology
2/5Copyright 2013, NetClarity, Inc. All rights reserved worldwide. NACwall, Inside-Out Network Security are NetClarity tradema
The need for a convenient access control solution for the BYOD workplac
Copyright 2013, NetClarity, Inc. All rights reserved worldwide. NACwall, Inside-Out Network Security are NetClarity tradema
The BYOD trend is
growing rapidly in
the market.
BYOD trend brings external threats insideOver 80% of all successful network security attacks originate behind th
firewall. This continues to be fueled by a trend of employee-owned dev
es in the workplace, which are inherently more difficult to manage, and
more susceptible to malware.
Heres how BYOD can pose a problem:
Administrators lack the tools needed to give them both visibility an
control over all assets accessing their network.
Some have Mobile Device Management (MDM) or other endpoint
software on those endpoints that support it and have it installed.
This is helpful, but incomplete.
NetClarity provides agentless discovery and control of the remainder as
well as all internal network assets through a protocol manipulation tech
nology by simply attaching it to a network.
Traditional security solutions; dynamic threatsThe set-it-and-forget- it mindset that applied to firewalls and wireless
security perimeters in the past is relatively ineffective in a BYOD work-
place. Here, the security threats are far more dynamic, with employees
inadvertently downloading malware by night and walking right past the
firewall the next morning into the office and connecting to the secure
wireless networks. Antivirus solutions, where installed, can help to mit
gate this risk through continual monitoring, but are only partially effec-tive and not supported universally.
NetClarity minimizes this risk by controlling access to all internal netwo
devices and by assessing the health of these devices via its vulnerabili
and malware detection engines.
Growing demand for convenient accesscontrol solutionsAccess control solutions have historically been a nightmare to
deploy, because they have depended upon one of the following
actions:
In line solutions: Re-architecting the network by placing theaccess control solution in-line with all network traffic, which
administrators hesitate to do because of the potential of
catastrophic downtime and the introduction of a new choke
point into the network;
Integrated solutions: Extensive integration with existing net-work infrastructure equipment like switches, RADIUS servers,
and firewalls, which is time-consuming and likely not to workwith all equipment in heterogeneous networks;
Agent based solutions: Using credentialed access to end-points or agents to be installed on endpoints, which means
that only certain endpoints can be supported (e.g., windows
devices, etc.), and this is also time consuming.
These options strain IT resources and budgets todayparticularly
in the midmarket, and are therefore impractical for effective man-
agement of BYOD. Here the solution must be both universally
applicable to all devices on the network, as well as seamless to
deploy and manage. NetClarity solves all of the above actions by
meeting the following requirements:
NetClarity is not in line of network trafficNetClarity does not require any change to network infrastructureNetClarityis completely agentless
A plug-n-play solution like NetClarity provides relief to both the
implementation pain-point and the incomplete coverage pain-
point through a fourth option: intelligent protocol manipulation.
-
8/13/2019 NAC Plus Data Sheet 2013 - NEM Technology
3/5Copyright 2013, NetClarity, Inc. All rights reserved worldwide. NACwall, Inside-Out Network Security are NetClarity tradema
True agentless discovery and blocking
NetClaritys philosophy is that in order for security to be prac-
ticed, it must first be practical. By merely attaching the NetClarity
appliance to the network requiring protection, you can immedi-
ately discover all internal network assets and block untrusted
devices at will. NetClarity is the only access control vendor that
can accomplish this because our blocking technology is based
on protocol manipulation, which means that it is universally ap-
plicable and independent from agents, credentials, network in-
frastructure equipment, OS or device type. It is both agentless
and integrationless.
Access control made simple with NetClarity
A quick look at how NetClaritys solutions work in your network
Multi-layered internal defense system
In addition to blocking untrusted devices, our security appl
ances proactively scan assets for common vulnerabilitie
and exposures (CVEs) on a regular basis to help you proac
tively manage your security posture. As a third layer of de
fense, the appliance integrates its malware detection en
gine with the blocking engine so that asset blocking can b
automatically triggered if evidence of malware traffic is de
tected via a port mirror from the core switch.
Firewalls are no longer enough
to protect from threats stemming
from inside the network.
Copyright 2013, NetClarity, Inc. All rights reserved worldwide. NACwall, Inside-Out Network Security are NetClarity tradema
NetClaritys proprietary blocking technology enables it to immediately block untrusted devices without depend-
ence upon any integration with network infrastructure or agents. Detection and blocking are immediate.
-
8/13/2019 NAC Plus Data Sheet 2013 - NEM Technology
4/5
Complete internal security with NetClarity
Asset discovery, analysis, and control
NetClaritys appliances are designed to protect your network fromthreats originating on the inside. Unauthorized devices connected
to your network make your organization vulnerable to malware,
viruses, and data theft. NetClaritys appliances detect, alert, and
block unauthorized devices from connecting to your network.
Vulnerability assessment
NetClaritys vulnerability scanner helps you identify the most ur-
gent patches needed to harden your network against attack. After
you run scans, detailed reports alert you if an attached device has
a problem, or you can simply block an asset if it fails a vulnerability
scan. These are very helpful in complying with requirements man-dated by HIPAA/HITECH, PCI, GLBA, and other security standards.
Zero-day malware protection
Quarantine or block malware-infested PCseven zero-day malware
that would otherwise go unchecked by standard virus-protection
software. Or NetClarity can simply issue an alert and you can de-
cide how to proceed with remediation.
Subscription services
NetClaritys cloud-based subscription service allows you to gain
access to zero-day malware heuristic updates, CVE tests, asset
fingerprint signatures, and firmware updates several times per day
to keep you continually protected in real-time.
Copyright 2013, NetClarity, Inc. All rights reserved worldwide. NACwall, Inside-Out Network Security are NetClarity tradema
RISKprofiler allows you to see a snapshot of your network and th
threats, vulnerabilities, and asset risk levels.
The Manage Assets screen allows you to trust and untrustassets that are trying to gain access onto your network.
The Command Center comes with all Enterprise appliances and
allows you to manage branch or remote locations efficiently.The Differential Report gives you the abili ty to show auditors
and executive management how your network posture has
improved.
-
8/13/2019 NAC Plus Data Sheet 2013 - NEM Technology
5/5Copyright 2013, NetClarity, Inc. All rights reserved worldwide. NACwall, Inside-Out Network Security are NetClarity tradema
Executive Summary: NetClarity can help solve the BYOD dilemma withconvenient Network Access Control solutions
Todays BYOD dilemma is fundamentally an access control dilemma, and a universally applicable
seamless product like NetClarity needs to be at the core of the solution. Antivirus and Mobile Device
Management software can complement and add depth overall, but from a security perspective a first
line of defense is needed. NetClarity becomes that line in the internal network by giving administrators
instant agentless visibility and access control over all devices. Its core technologies provide multiple
defense layers, and most importantly, a seamless access control solution in a world where NAC has
previously been dismissed because of cost and complexity.
NetClarity is an emerging leader in access control products and
technology because of our deployment-in-minutes architecture. We sellour software pre-packaged on industry-standard network appliances into a
variety of verticals in the mid-market segment. Our solutions capitalize on
two significant industry trends: the exponentially increasing threats to
networks from malware, cyber criminals in tandem with a rapid increase
in the number of employee-owned mobile wireless devices in the
workplace (BYOD); and the need to demonstrate that networks are in
compliance with regulatory agencies.
NetClarity sells its products and services through channel partners
worldwide.
About NetClarity
The NetClarity core NACfunctionality is augmentedthrough two additionaldefense layers: proactivevulnerability managementand malware detection.
About NEM Technology
NEM Technology is a company that is focused on k
you connected to everything. Integrating voice, vide
data solutions for the small to midsize marketplace
Technology provides technology planning, insta
maintenance, and managed services throughout the
of Michigan. For more information on securing
networks, contact NEM Technology at 877-739-2177.
mailto:[email protected]://www.twitter.com/netclarityhttp://www.twitter.com/netclarityhttp://www.facebook.com/netclarityhttp://www.linkedin.com/company/130511?trk=tyahhttp://www.netclarity.net/http://www.linkedin.com/company/130511?trk=tyahhttp://www.facebook.com/netclarityhttp://www.twitter.com/netclaritymailto:[email protected]