NetBeat Network Access Control
- Overview
- Benefits
- Capabilities
- Specifications
- Deployment
- Documentation
- FAQs
Why NetBeat NAC?
Unlike competing NAC solutions that require complex integration with your network, NetBeat NAC intelligent protocol manipulation technology enables you to block untrusted or malware-infected devices from network access, easily. Spend less than 1 hour setting up the appliance, and enjoy the rest of the 30-day trial with 3 new levels of security on your network: Agentless NAC, Vulnerability Auditing, and Malware Defense!
Overview
NetBeat NAC is a next generation network access control (NAC) solution that lets you gain visibility and control over your networks by automatically blocking untrusted devices that should not be gaining access.
Many companies today are focusing on securing their organization from threats that exist outside the perimeter of their network by using firewalls and IDS/IPS systems. But most of today’s threats are not entering the organization through the firewall, but through malware-infected devices behind the firewall. In order to strike at the root cause of this, you need a network access control solution that blocks unwanted devices from accessing your network.
The problem with traditional NACs is that they were complex, costly, and not flexible enough to work within your existing network. Not anymore.
NetBeat NAC is the next-generation solution to comprehensive access control that is simple to deploy and manage. No agents or changes to network infrastructure; it could simply be taken out of the box and blocking untrusted devices within a few minutes.
In order for security to be practiced, it must be practical.
Mid-sized companies across all industries can depend on NetBeat NAC to defend their networks against untrusted or unwanted devices in three simple steps:
Step 1: Build your trust list through automatic discovery or via CSV import.
Step 2: Enable blocking of devices outside of trust list. Or set up custom alerts to see when new devices attach to your network.
Step 3: Sit back and relax, knowing that NetBeat NAC has you covered against rogue or malicious devices.
Beyond this core NAC functionality, NetBeat NAC appliances can enumerate vulnerabilities present on the devices accessing your network in a non-intrusive way similar to how hackers would, so that you can be proactive about remediating vulnerabilities. Appliances are also equipped with a malware detection feature designed to identify outbound "command and control" traffic destined toward known malware sites, and this is integrated with the blocking engine to provide millisecond response time to contain this type of malware threats.
NetBeat NAC in Action - Automatically discover and block untrusted devices
Benefits
NetBeat NAC is a cost effective, easy to deploy, and easy to use Network Access Control solution for mid-sized companies.
Benefits
- Effectively manage BYOD by securing your corporate network from unknown devices
- Minimize breaches by blocking any unknown device on your network
- Know exactly who and what is on your network at all times to meet or maintain compliance
- Easy to install and provision - can be setup in minutes
- Management branch locations remotely without needing IT staff on-site
Features
- Real-time asset identification and classification
- Automatically deny access to any IP - both wired and wireless - that is trying to attach to your network
- Compliance reporting for PCI, HIPAA, GLBA, SOX
- Command Center allows you to manage remote sites from one location
Capabilities
In addition to blocking untrusted devices, the NetBeat NAC appliances proactively scan assets for common vulnerabilities and exposures (CVEs) on a regular basis to help you proactively manage your security posture. As a third layer of defense, the appliance integrates its malware behavior detection engine with the blocking engine so that asset blocking can be automatically triggered if evidence of malware traffic is detected via a port mirror from the core switch.
Asset discovery, analysis, and control
NetBeat NAC appliances are designed to protect your network from threats originating on the inside. Unauthorized devices connected to your network make your organization vulnerable to malware behavior, viruses, and data theft. NetBeat NAC appliances detect, alert, and block unauthorized devices from connecting to your network.
Vulnerability assessment
NetBeat NAC vulnerability scanner helps you identify the most urgent patches needed to harden your network against attack. After you run scans, detailed reports alert you if an attached device has a problem, or you can simply block an asset if it fails a vulnerability scan. These are very helpful in complying with requirements mandated by HIPAA/HITECH, PCI, GLBA, PSN, ISO and other security standards.
Zero-day malware protection
Quarantine or block malware-infested PCs—even zero-day malware that would otherwise go unchecked by standard virus-protection software. Or NetBeat NAC can simply issue an alert and you can decide how to proceed with remediation.
Subscription services
NetBeat NAC cloud-based subscription service allows you to gain access to zero-day malware heuristic updates, CVE tests, asset fingerprint signatures, and firmware updates several times per day to keep you continually protected in real-time.
The Command Center comes with all Enterprise appliances and allows you to manage branch or remote locations efficiently.
Specifications
The NetBeat NAC Nano units are small, portable, low-heat, low-power, wall mountable, while the NetBeat NAC Branch and Enterprise Appliances are 1U Rackable hardware, all running the EasyNAC® software technology on hardened Linux operating systems. The technical specifications for all NetBeat NAC models are listed below.
NANO 25 and 100 | Branch Pro | Enterprise 10 | Enterprise 100 | Enterprise 250 | |
---|---|---|---|---|---|
Form Factor | Mini-ITX wall mount | 1U Rackmount | 1U Rackmount | 1U Rackmount | 1U Rackmount |
*Protected Nodes | 25 or 100 | 500 | 1000 | 1500 | 2000 |
Setup Time | 15 minutes | 30 minutes | under an hour | 1-4 hours | 4-8 hours |
Storage for Logs | 150 GB | 250 GB | 1000 GB | 1000 GB | 1000GB (1 TB) |
802.1q Tagged VLANS | 10 VLANs | 20 VLANs | 40 VLANs | 60 VLANs | 80 VLANs |
Ethernet Ports | 2 | 2 | 4 | 6 | 8 |
Agentless Active Directory (AD) Support | YES | YES | YES | YES | YES |
Agentless NAC | YES | YES | YES | YES | YES |
Agentless CVE (r) Audits | YES | YES | YES | YES | YES |
Agentless Malware Blocking | YES | YES | YES | YES | YES |
Auto Device Discovery | YES | YES | YES | YES | YES |
Inventory Alerting | YES | YES | YES | YES | YES |
MAC Spoof Detection | YES | YES | YES | YES | YES |
MAC & IP Spoof Block | YES | YES | YES | YES | YES |
Multiple User Logins | YES | YES | YES | YES | YES |
Workflow Engine | YES | YES | YES | YES | YES |
Compliance Reports | YES | YES | YES | YES | YES |
Command Center | NO | NO | YES | YES | YES |
Controllable Units | N/A | N/A | up to 10 remote | up to 100 remote | up to 250 remote |
Manageable | YES | YES | YES | YES | YES |
Deployment
The NetBeat NAC appliances can be taken out of the box and begin blocking assets within minutes. NetBeat NAC was built to be practical; making setup and use simple and efficient. Follow these steps and you’re on your way to a secure network.
NetBeat NAC Setup
- Pull the NAC out of the box.
- Plug it in – NetBeat NAC does NOT need to sit inline of network traffic.
- Setup in minutes – You do not need to make any changes to your network infrastructure or install agents on your endpoints. Simply build your trust list through automatic discovery and enable blocking of devices that are outside of your trust list.
- Enjoy a secure network with NetBeat NAC.
Case Studies
NAC Case Study: Healthcare | NAC Case Study: Government |
Documentation
Because the NetBeat NAC User Guide contains proprietary information, it can be found within the Help menu on your NetBeat NAC appliance.
<">