spacer spacer

 
  • Compromised?
  • Request a Demo
  • How to Buy
  • Customer Support

Search form

  • Solutions
    • Energy
    • Financial Services
    • Healthcare
    • Retail
    • Telecommunications
  • Products
    • Overview
    • HawkEye G
    • HawkEye AP
      • Extending Your Existing SIEM
    • Managed Services
    • NetBeat NAC
  • Information Center
    • Discover
      • Data Sheets
      • Case Studies
      • White Papers
      • Product Videos
      • Industry Reports
      • Industry Videos
      • Product Information
      • Webinars
        • On-Demand Webinars
    • Calendar of Events
      • Events Archive
    • Our Customers
  • HexisCARE
    • HawkEye Customer Support
    • NetBeat Customer Support
    • Global Training Services
  • Partners
    • The Hexis Cyber Solutions Partner Program
    • Tech Partners/Alliances
    • Become a Hexis Partner
    • How To Buy
    • Partner Login
  • Company
    • News Room
    • Careers
    • Management
    • Investor Relations
  • Blog
  • Contact
    • Mailing List

You are here

Home › Products › NetBeat Network Access Control

NetBeat Network Access Control

  • Overview
  • Benefits
  • Capabilities
  • Specifications
  • Deployment
  • Documentation
  • FAQs

Why NetBeat NAC?

Unlike competing NAC solutions that require complex integration with your network, NetBeat NAC intelligent protocol manipulation technology enables  you to block untrusted or malware-infected devices from network access, easily.  Spend less than 1 hour setting up the appliance, and enjoy the rest of the 30-day trial with 3 new levels of security on your network: Agentless NAC, Vulnerability Auditing, and Malware Defense!

spacer

Overview

NetBeat NAC is a next generation network access control (NAC) solution that lets you gain visibility and control over your networks by automatically blocking untrusted devices that should not be gaining access.

Many companies today are focusing on securing their organization from threats that exist outside the perimeter of their network by using firewalls and IDS/IPS systems. But most of today’s threats are not entering the organization through the firewall, but through malware-infected devices behind the firewall. In order to strike at the root cause of this, you need a network access control solution that blocks unwanted devices from accessing your network.

The problem with traditional NACs is that they were complex, costly, and not flexible enough to work within your existing network. Not anymore.

NetBeat NAC is the next-generation solution to comprehensive access control that is simple to deploy and manage. No agents or changes to network infrastructure; it could simply be taken out of the box and blocking untrusted devices within a few minutes.

In order for security to be practiced, it must be practical.

Mid-sized companies across all industries can depend on NetBeat NAC to defend their networks against untrusted or unwanted devices in three simple steps:

Step 1: Build your trust list through automatic discovery or via CSV import.

Step 2: Enable blocking of devices outside of trust list. Or set up custom alerts to see when new devices attach to your network.

Step 3: Sit back and relax, knowing that NetBeat NAC has you covered against rogue or malicious devices.

Beyond this core NAC functionality, NetBeat NAC appliances can enumerate vulnerabilities present on the devices accessing your network in a non-intrusive way similar to how hackers would, so that you can be proactive about remediating vulnerabilities. Appliances are also equipped with a malware detection feature designed to identify outbound "command and control" traffic destined toward known malware sites, and this is integrated with the blocking engine to provide millisecond response time to contain this type of malware threats.

NetBeat NAC in Action - Automatically discover and block untrusted devices

spacer spacer spacer

 

Benefits

NetBeat NAC is a cost effective, easy to deploy, and easy to use Network Access Control solution for mid-sized companies.

Benefits

  • Effectively manage BYOD by securing your corporate network from unknown devices
  • Minimize breaches by blocking any unknown device on your network
  • Know exactly who and what is on your network at all times to meet or maintain compliance
  • Easy to install and provision - can be setup in minutes
  • Management branch locations remotely without needing IT staff on-site

Features

  • Real-time asset identification and classification
  • Automatically deny access to any IP - both wired and wireless - that is trying to attach to your network
  • Compliance reporting for PCI, HIPAA, GLBA, SOX
  • Command Center allows you to manage remote sites from one location

Capabilities

spacer In addition to blocking untrusted devices, the NetBeat NAC appliances proactively scan assets for common vulnerabilities and exposures (CVEs) on a regular basis to help you proactively manage your security posture. As a third layer of defense, the appliance integrates its malware behavior detection engine with the blocking engine so that asset blocking can be automatically triggered if evidence of malware traffic is detected via a port mirror from the core switch.

Asset discovery, analysis, and control
NetBeat NAC appliances are designed to protect your network from threats originating on the inside. Unauthorized devices connected to your network make your organization vulnerable to malware behavior, viruses, and data theft. NetBeat NAC appliances detect, alert, and block unauthorized devices from connecting to your network.

Vulnerability assessment
NetBeat NAC vulnerability scanner helps you identify the most urgent patches needed to harden your network against attack. After you run scans, detailed reports alert you if an attached device has a problem, or you can simply block an asset if it fails a vulnerability scan. These are very helpful in complying with requirements mandated by HIPAA/HITECH, PCI, GLBA, PSN, ISO and other security standards.

Zero-day malware protection
Quarantine or block malware-infested PCs—even zero-day malware that would otherwise go unchecked by standard virus-protection software. Or NetBeat NAC can simply issue an alert and you can decide how to proceed with remediation.

Subscription services
NetBeat NAC cloud-based subscription service allows you to gain access to zero-day malware heuristic updates, CVE tests, asset fingerprint signatures, and firmware updates several times per day to keep you continually protected in real-time.

The Command Center comes with all Enterprise appliances and allows you to manage branch or remote locations efficiently.

spacer

Specifications

The NetBeat NAC Nano units are small, portable, low-heat, low-power, wall mountable, while the NetBeat NAC Branch and Enterprise Appliances are 1U Rackable hardware, all running the EasyNAC® software technology on hardened Linux operating systems. The technical specifications for all NetBeat NAC models are listed below.

  NANO 25 and 100 Branch Pro Enterprise 10 Enterprise 100 Enterprise 250
Form Factor Mini-ITX wall mount 1U Rackmount 1U Rackmount 1U Rackmount 1U Rackmount
*Protected Nodes 25 or 100 500 1000 1500 2000
Setup Time 15 minutes 30 minutes under an hour 1-4 hours 4-8 hours
Storage for Logs 150 GB 250 GB 1000 GB 1000 GB 1000GB (1 TB)
802.1q Tagged VLANS 10 VLANs 20 VLANs 40 VLANs 60 VLANs 80 VLANs
Ethernet Ports 2 2 4 6 8
Agentless Active Directory (AD) Support YES YES YES YES YES
Agentless NAC YES YES YES YES YES
Agentless CVE (r) Audits YES YES YES YES YES
Agentless Malware Blocking YES YES YES YES YES
Auto Device Discovery YES YES YES YES YES
Inventory Alerting YES YES YES YES YES
MAC Spoof Detection YES YES YES YES YES
MAC & IP Spoof Block YES YES YES YES YES
Multiple User Logins YES YES YES YES YES
Workflow Engine YES YES YES YES YES
Compliance Reports YES YES YES YES YES
Command Center NO NO YES YES YES
Controllable Units N/A N/A up to 10 remote up to 100 remote up to 250 remote
Manageable YES YES YES YES YES

 

Deployment

The NetBeat NAC appliances can be taken out of the box and begin blocking assets within minutes. NetBeat NAC was built to be practical; making setup and use simple and efficient. Follow these steps and you’re on your way to a secure network.

spacer

NetBeat NAC Setup

  1. Pull the NAC out of the box.
  2. Plug it in – NetBeat NAC does NOT need to sit inline of network traffic.
  3. Setup in minutes – You do not need to make any changes to your network infrastructure or install agents on your endpoints. Simply build your trust list through automatic discovery and enable blocking of devices that are outside of your trust list.
  4. Enjoy a secure network with NetBeat NAC.

Case Studies

spacer spacer
NAC Case Study: Healthcare NAC Case Study: Government

Documentation

Because the NetBeat NAC User Guide contains proprietary information, it can be found within the Help menu on your NetBeat NAC appliance.

<">
gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.