Managed Network Access Control (NAC)

Network Access Control: Restricting and Monitoring Access to Your Network and Data

Managed Network Access Control Service helps organizations mitigate threats generated by endpoints such as mobile devices, PCs, laptops, wireless access points and other devices that connect to the corporate network.

Managed Network Access Control SERVICE FEATURES

Managed Network Access Control from Risk Cognizance helps organizations mitigate threats created by rogue endpoints including mobile devices, PCs and laptops, wireless access points, and other devices by notifying when they connect to the corporate environment based on pre-determined policies. You have the capability to select use cases to target specific needs in your environment.

 

  • Misconfigured Asset Detection
  • Flexible Access Control by User, Device or Policy
  • Remediation of Out of Compliance Endpoints
  • Unauthorized Application Prevention
  • Rogue Device Prevention
  • Identity and Access Management

Reduce

costs with simplified, flat-pricing model and optimize the value of your security investments

  • Rogue Device Detection 
  • IoT Device Detection
  • Advanced Asset Visibility 
  • Endpoint Compliance Detection
  • Unauthorized Application Notification

 Improve SECURITY

your security posture and make device configuration changes without per-device restrictions

CyberSecOP Secure Web Gateway and response services:

Risk Cognizance secure web gateway solution is an advanced set of technologies working together to protect your organization in the cloud, across the web, social media, applications and mobile networks. Secure Web Gateway is available as a high performance cloud service or as an on-premise or virtual solution. Any combination of these can be used in a centrally managed hybrid deployment.

Advanced Secure Web Gateway

Risk Cognizance provides real-time NAC solutions that improve enterprise network security and workforce productivity. Learn about our network access control solutions.

  • Access policy: This is the over-arching use case for NAC,  It allows the administrator to define multiple access policies that govern users and devices connecting to the network based on specific situations such as user profile, device type or user location.
  • Compliance checks of endpoint devices: When a NAC client runs on end user compute devices, it can continually check and validate to ensure the appropriate software is installed, as well as confirming the devices have updated versions or patch management. If the device fails any of these compliance checks, it will likely be denied access to the network until appropriate updates are made.
  • Guest access: There will be times that an organization needs to allow non-employees to access the network. An NAC solution can provide guests the ability to connect to the corporate network with restricted access.
  • Device discovery and profiling: Due to the increased use of the Internet of Things (IoT), especially in particular industry verticals such as healthcare or manufacturing, the IT administrator needs to a comprehensive view of any and all devices connected to the network. NAC is very useful as it has the capability to discover all devices on the network, and then fingerprints and profiles them so the IT administrator has a global view of what is on the network.
  • Enforcement: There will be times when an unauthorized device or user attempts to connect to the network. When this happens, the NAC solution can automatically disconnect the device. There is also an option to quarantine the device until an investigation is done to determine if the device was supposed to be authorized and why it was exhibiting unauthorized behaviors.
  • Security analytics: Network access control is an important part of the security system. It can continuously monitor the behavior of devices while on the network by collecting logs, flows and packets. The NAC solution can also apply machine learning and security analytics in order to detect malicious behavior that could lead to exfiltration, stolen credentials, or attack on the network infrastructure.