Use Cases

OpenNAC

 

PROFILING AND POSTURING

Discover and monitor the behavior of every device connected to your network

Get a full inventory of devices, infrastructure, users, and applications and, what it is more important, continuously monitor their behavior to detect inappropriate actions, possible threats and device compliance level.

  • REAL TIME MONITORING: Discover and control every device and detect behaviors (posturing) that are unexpected for a given device entity (profiling)
  • MAXIMUM FLEXIBILITY AND INTEGRATION: Concentrate and analyze security information from third party network devices like FW or IDS

DYNAMIC VLAN CONFIGURATION

Dynamically adapt and configure your network without human intervention

openNAC allows you to define access policies based on the characteristics of the device and the user, dynamic and automatically adapting user’s access rights.

  • REAL-TIME VISIBILITY: Real-time inventory of all devices accessing the corporate network and network usage audit for connected devices
  • MINIMUM HUMAN INTERVENTION: Policies are automatically applied, reducing work load and unnecessary risks
  • RESOURCE OPTIMIZATION: Reduce the workload of your IT department by automating user registration process with a captive portal

QUARANTINE INFECTED DEVICES

Detecting a compromised device in your network is only the first step

openNAC allows you to automatically isolate infected devices avoiding any further collateral damage

  • MAXIMUM FLEXIBILITY AND INTEGRATION: Concentrate and analyze security information from third party network devices like FW or IDS
  • MINIMUM HUMAN INTERVENTION: Policies are automatically applied, reducing work load and unnecessary risks
  • DAMAGE AND RISK MITIGATION: Automatically detect a threat in your network, isolating the device in layer 2 and avoiding threat evolution and propagation

GUESTS ACCESS CONTROL

Uncompromised productivity

Why choosing between network security and external users’ productivity if you can have it all with openNAC

  • SECURITY AND PRODUCTIVITY: Dynamically adapt your network to the needs and access rights of each user
  • RESOURCE OPTIMIZATION: Reduce the workload of your IT department by automating user registration process with a captive portal
  • COMPLIANCE: Define the security requirements needed to access your corporate network from any device (AV, FW, OS, etc.)

BYOD SECURITY

Provide a secure network access to employee owned mobile devices

To restrict the mobility of your employees diminishes their productivity but a compromised device accessing your network can put your business at risk. Safely adopt BYOD phenomenon with openNAC

  • REAL-TIME MONITORING: Discover and control every device and detect behaviors (posturing) that are unexpected for a given entity (profiling) all without an agent
  • COMPLIANCE: Define the security requirements (AV, FW, OS, etc.) needed to access your corporate network from any device, even non-corporate ones
  • RESOURCE OPTIMIZATION: Reduce the workload of your IT department by automating user registration process with a captive portal.

ENERGY EFFICIENCY

Optimize the energy consumption of you devices

openNAC allows you to define energy saving policies based on user behavior and the status of their devices

  • MINIMUM HUMAN INTERVENTION: Policies are automatically applied, reducing work load and optimizing results
  • RESOURCE OPTIMIZATION: Reduce energy consumption in an automated manner and effortless for your employees and IT management resources

VPN ACCESS WITH TWO-FACTOR AUTHENTICATION

Homogeneous network access policy

Set the same security policy, whether for local and remote connections, and add an extra security layer for remote access by including a two-factor authentication with One-Time-Password

  • SECURE REMOTE ACCESS: Enhance remote access security with a two-factor authentication combined with a One-Time-Password protection
  • HOMOGENEOUS AND CENTRALIZED ACCESS MANAGEMENT: Set a global network access policy for wired, wireless and VPN connections
  • COMPLIANCE: Define the security requirements needed to access your corporate network from any device (AV, FW, OS, etc.)


Viapps

 

LOAD BALANCE

  • LDAP Service: Balancing of LDAP servers farm for massive portal authentication. With check of real servers integrity
  • Web Servers with SSL Offload: Web server balancing with persistence with cookie and SSL encryption

DNS/DHCP/NTP

  • Primary DNS Architecture Integrated with Active Directory: Viapps receives the dynamic zone updates based on the equipment registered in the domain
  • Secondary DNS Architecture and Resolvers: The customer has its legacy DNS infrastructure and Viapps provides all the Secondary DNS infrastructure and resolvers, in an integrated way

SMTP RELAY

  • SMTP Servers Farm for mass mailing: Farm balanced for mass mailing with horizontal scalability

FIREWALL

  • Secure Connection with QoS Management: Secure connection over IPsec tunnel with traffic filtering and QoS definition to limit the maximum bandwidth

HTTP PROXY

  • Redounded HTTP Proxy output and high availability: Using Viapps balancers, two HTTP Proxy modules manage web requests using high availability with balancing at level 4 and Proxy Healthcheck.

Contact us and get a free trial of openNAC

Click the following link to schedule a guided demonstration