Discover, Manage, Protect

The NAC Solution that adapts to YOU

 

 

A Changing and Vulnerable Scenario: The evolution of corporate network infrastructure
  •  Increased number of user devices.
  •  Increased diversity of devices
  •  Increased user mobility
  •  Increased network complexity
The result 
  •  An increase in security incidents
  •  More complex network control 
  •  Reduced network availability
  •  Reduced productivity
  •  Business competitive disadvantage

01 Why openNAC? Turn Security into an Investment

  • Mobile devices, BYOD and cloud phenomenon, are increasingly exposing networks to threats
  • Access Control has become the most effective way to ensure the security of corporate networks
  • openNAC facilitates network visibility and management, reducing the impact of the intrusions and enhancing productivity
  • openNAC turns Security into an Investment instead of a cost

02 Discover, Manage, Protect

  • Flexible: Pay only for the features you really need
  • Centralized: Deploy and manage from a single central location
  • Ease of Integration: Easily integrate your other third-party solutions
  • Scalable: Dynamically adapts to your needs, as your network grows
  • Multivemdor: Enhance network electronic from multiple vendors

03 Deployment Architecture

  • Reduced footprint: openNAC is Deployed in the customer’s Data Center as a virtual machine
  • Ease of deployment: openNAC configures access layer equipment to retrieve network access information and to apply the defined policy
  • Reduced network impact: openNAC operates off-line avoiding bottle necks and traffic congestion
  • Flexibilidad and integration: openNAC’s hybrid approach allows integration with existing NGFW solutions (e.g. Palo Alto, Fortinet, …) or it can include its own sensor to complement 802.1x information

04 Features of Interest

  • Visibility
    • Network and User device auto-inventory in real time
    • Reporting system adaptable to different profiles
    • Protection for personal (BYOD) and corporate devices both for employees of the company and visitors
  • Control
    • Central security policy based on user, device, time and location to enforce an access policy (VLAN and security profile)
    • Flexible credentials backend based on multiple LDAPs or AD
    • Support and authentication for detecting devices using 802.1X or SNMP traps
  • Remediation
    • Network Intelligence: dynamic adaptation to the network based on the connections (user profiles and devices), essential to mitigate incidents
    • Captive Portal for automatic user registration and remediation

Deployment Stages


REAL-TIME MONITORING

Network information collection. Provisioning of network devices and users. Device status assessment and audit. Detection of rogue devices 

COMPLIANCE

Policy creation using predefined profiles. Dynamic VLAN configuration. Remediation captive portal

NETWORK INTELLIGENCE

Network adoption to user and device profile. Dynamically share network information. Dynamic ACLs. 


Professional Services


CONSULTING

Initial Consulting on implementation and risk mitigation within the scope of application. Set the appropriate architecture and methodology for your company to improve the security of access and authorization from your network.

IMPLEMENTATION

Assessment of the actual customer's needs and feature customization. Design, implementation and deployment of openNAC aligned to your business processes.

SUPPORT & TRAINING

Support 8X5 and 24X7, depending on the needs. Training and Certification of required staff.

DEVELOPMENT, INTEGRATION AND CUSTOMIZATION

Creating specific modules and functionalities to meet your needs. Integration with third party tools. Support new infrastructure.


Use cases


  • 01 PROFILING Y POSTURING
  • 02 DYNAMIC VLAN CONFIGURATION
  • 03 QUARANTINE INFECTED DEVICESS

Discover and monitor the behavior of every device connected to your network

Get a full inventory of devices, infrastructure, users, and applications and, what it is more important, continuously monitor their behavior to detect inappropriate actions, possible threats and device compliance level.

  • REAL TIME MONITORING: Discover and control every device and detect behaviors (posturing) that are unexpected for a given device entity (profiling)
  • MAXIMUM FLEXIBILITY AND INTEGRATION: Concentrate and analyze security information from third party network devices like FW or IDS

Dynamically adapt and configure your network without human intervention

openNAC allows you to define access policies based on the characteristics of the device and the user, dynamic and automatically adapting user’s access rights.

  • REAL-TIME VISIBILITY: Real-time inventory of all devices accessing the corporate network and network usage audit for connected devices
  • MINIMUM HUMAN INTERVENTION: Policies are automatically applied, reducing work load and unnecessary risks
  • RESOURCE OPTIMIZATION: Reduce the workload of your IT department by automating user registration process with a captive portal

Detecting a compromised device in your network is only the first step

openNAC allows you to automatically isolate infected devices avoiding any further collateral damage

  • MAXIMUM FLEXIBILITY AND INTEGRATION: Concentrate and analyze security information from third party network devices like FW or IDS
  • MINIMUM HUMAN INTERVENTION: Policies are automatically applied, reducing work load and unnecessary risks
  • DAMAGE AND RISK MITIGATION: Automatically detect a threat in your network, isolating the device in layer 2 and avoiding threat evolution and propagation

  • 04 GUESTS ACCESS CONTROL
  • 05 BYOD SECURITY
  • 06 ENERGY EFFICIENCY
  • 07 VPN ACCESS WITH TWO-FACTOR AUTHENTICATION

Uncompromised productivity

Why choosing between network security and external users’ productivity if you can have it all with openNAC

  • SECURITY AND PRODUCTIVITY: Dynamically adapt your network to the needs and access rights of each user
  • RESOURCE OPTIMIZATION: Reduce the workload of your IT department by automating user registration process with a captive portal
  • COMPLIANCE: Define the security requirements needed to access your corporate network from any device (AV, FW, OS, etc.)

Provide a secure network access to employee owned mobile devices

To restrict the mobility of your employees diminishes their productivity but a compromised device accessing your network can put your business at risk. Safely adopt BYOD phenomenon with openNAC

  • REAL-TIME MONITORING: Discover and control every device and detect behaviors (posturing) that are unexpected for a given entity (profiling) all without an agent
  • COMPLIANCE: Define the security requirements (AV, FW, OS, etc.) needed to access your corporate network from any device, even non-corporate ones
  • RESOURCE OPTIMIZATION: Reduce the workload of your IT department by automating user registration process with a captive portal.

Optimize the energy consumption of you devices

openNAC allows you to define energy saving policies based on user behavior and the status of their devices

  • MINIMUM HUMAN INTERVENTION: Policies are automatically applied, reducing work load and optimizing results
  • RESOURCE OPTIMIZATION: Reduce energy consumption in an automated manner and effortless for your employees and IT management resources

Homogeneous network access policy

Set the same security policy, whether for local and remote connections, and add an extra security layer for remote access by including a two-factor authentication with One-Time-Password

  • SECURE REMOTE ACCESS: Enhance remote access security with a two-factor authentication combined with a One-Time-Password protection
  • HOMOGENEOUS AND CENTRALIZED ACCESS MANAGEMENT: Set a global network access policy for wired, wireless and VPN connections
  • COMPLIANCE: Define the security requirements needed to access your corporate network from any device (AV, FW, OS, etc.)

Contact us and get a free trial of openNAC

Click the following link to schedule a guided demonstration