The traditional approach to achieving network visibility through device fingerprinting is no longer sufficient to meet the demands of the IoT era, where most devices now access networks that are constantly changing. Genians’ network sensing technology powered by Device Platform Intelligence (DPI) discovers and presents all detected devices’ business contextual and risk-related information along with their technical information without disturbing existing network infrastructure. The resulting intelligence enhances visibility and allows operators to detect and respond to any non-compliant or compromised devices in real time.
Now, you have two options to get the device platform intelligence. The first option is to have all Genians NAC components inside of your network. The second option is to run the Policy Server in the Cloud while you are deploying the Network Sensor in your network. Either way, you will get the same result. Once you get better visibility without disturbing existing network operation, you will have much better ideas of what needs to be done in order to secure your network edges. So let’s get started.
With the result of comprehensive network visibility, Genians can ensure compliance from all connected devices by leveraging Virtual In-Line Packet Inspection which operates at Layer 2. This technology has complete control over endpoint device traffic over TCP and UDP by eliminating the need for complex configurations and network changes.
Also, Genians delivers all critical network access control features like IPAM, Switch Ports, WLAN security, Desktop configuration, IT asset, BYOD and Guest Management out of the box at the most affordable pricing options.
Genian NAC delivers the most essential cybersecurity features in an all-in-one format, while offering an affordable pricing model. Genians provides three flexible deployment options: On-premise, Cloud-managed, and Network Access Control as a Service (NACaaS) for Managed Security Services Providers. From these, organizations can choose the best option for their particular business requirements.
Install and run Genian NAC on the premises of your organization using the Genian NAC software
Run Policy Server in the Cloud and get Next-Gen NAC for a fraction of the cost of traditional NAC solutions
Deliver NAC as a Service for your MSP business or organizations ready for Cloud services
Genians’ Next-Gen NAC provides any organization with the most essential cybersecurity features and functionalities. These act as a seed from which one can cultivate a robust cybersecurity environment while offering the most affordable pricing and flexible deployment options.
Achieving cybersecurity in the real world means going beyond the constraints of any given set of compliance requirements and taking the necessary actions that an active, real-time approach to security management necessarily involves.
Genian NAC can monitor IP-enabled devices on your network in real-time using a non-disruptive Layer 2 based Network Sensor and classifies those devices and their users into logical groups based on your business requirements. Genian NAC has the intelligence to sort out a wide range of network-connected devices and their states to present immediate, meaningful, and actionable information.
Coverage
Detection
Observation
“Device Platform” refers to any hardware or software, or any combination of hardware and software (OS), used to access a network.
Genian NAC incorporated with Device Platform Intelligence (DPI) can present the most accurate device identity, its contextual, and its risk information in order to enhance network visibility and secure network access for the IoT era. DPI can be shared through the Genians Cloud.
Distinct information
Business Information
Extended Information
Technology Vulnerability
Business Vulnerability
Dynamic Acess Control
Multi-layered Access Control
Onboarding Process
Secure Access Request
Monitoring
Comprehensive IP Management
Monitoring
Port Management
WLAN Monitoring
WLAN Compliance
Wireless Connection Manager
Manage all desktop configurations, applications, OS Updates, peripheral devices, wireless connections and more. Standardize the configuration of corporate-owned devices automatically and control them remotely.
Genian NAC integrates a wide range of IT security and business solutions (Firewall, VPN, IDS/IPS, VM, MDM, SIEM, APT, DLP, CRM/ERP, etc.) to ensure unified policy enforcement. Genian NAC supports custom integration using Webhook, REST API, and Syslog.
Perimeter Security System (Next-gen Firewall)
Threat Detection System (SIEM, ATP, VA, EDR)
Cybersecurity compliance and the management of security risk are clearly two different things. Yet achieving the optimal cyber-defense framework for your organization requires that the two are managed in a mutually supportive fashion. Genians’ Next-Gen NAC supports this approach by leveraging the Center for Internet Security (CIS) Controls.
The CIS Controls provide global standards for cybersecurity. These have become recognized around the world for providing a set of best practices that can be leveraged to secure IT systems and data against attacks.
Without disturbing existing IT infrastructure or impacting systems availability, Genian NAC gathers and monitors the hardware and software asset information of all IP-enabled devices. It then leverages its Device Platform Intelligence capability to determine each device’s technical and business contextual details, identifies all known or potential device vulnerabilities, establishes the level of user access to be provided, and ensures that all detected devices are being compliant. Additionally, Genians NAC can integrate with security solutions such as NGFW, SIEM, and EMM to share intelligence to respond to cyber threats on time. Additional controls, such as those below, can also be implemented efficiently using Genian NAC.
7. Email and Web Browser Protections
8. Malware Defenses
9. Limitation and Control of Network Ports, Protocols and Services
10. Data Recovery Capabilities
11. Secure Configuration for Network Devices, such as Firewalls, Routers and Switches
12. Boundary Defense
13. Data Protection
14. Controlled Access Based on the Need to Know
15. Wireless Access Control
16. Account Monitoring and Control
17. Implement a Security Awareness and Training Program
18. Application Software Security
19. Incident Response and Management
20. Penetration Tests and Red Team Exercises
Genians’ Next-Gen NAC can support the necessary balance between the dictates of compliance and an organization’s need to maintain operational security practice in tandem.
October 23, 2015
anasayfa-eng, Network Access Control, Security, Stars