Software Category

Network Access Control

Software Reviews covers 14 products in the Network Access Control market. Fast track your research by exploring our Data Quadrant, sorting the software, purchasing our Network Access Control Category Report, or diving deeper into an individual product. Arm yourself with real data so you can make better decisions with more confidence.

Write Review Buy Category Report / $999

Data Quadrant

The software experience is shaped by both the software and the relationship with the vendor. By comparing vendors across both we provide a comprehensive understanding of the product and help identify vendors that can deliver on both.

Sample Report

Category Report

A thorough evaluation and ranking of all software in an individual category to compare software across every dimension.

  • User Satisfaction Rankings
  • Business Value Scores
  • Vendor Capability Comparisons
  • Individual Feature Evaluations
  • Emotional Connection to Products
Buy Now / $999

Sample Report

Emotional Footprint Report

A detailed and unique report across 5 emotional dimensions that capture a powerful indicator of overall user feeling toward the vendor and product.

  • Service Experience
  • Conflict Resolution
  • Negotiation and Contract
  • Strategy and Innovation
  • Product Impact
Buy Now / $999

CISCO

Cisco Identity Services Engine

The Cisco® Identity Services Engine (ISE) helps IT professionals meet enterprise mobility challenges and protect the evolving network across the attack continuum. The market-leading platform for security-policy management, it unifies and automates access control to enforce compliance-driven role-based access to networks and network resources.

--

Composite Score

Composite
Score

+72

Emotional Footprint

Emotional
Footprint

80%

Likeliness to Recommend

Likeliness
to Recommend

26Reviews

Intel Corporation

McAfee Network Access Control Appliance

Maximize the effectiveness of your McAfee solution with McAfee Professional Services Architectural Review for McAfee Network Access Control. Our experts will carry out an architectural review of your environment, so that your solution is optimized to address the specific requirements of your infrastructure.

--

Composite Score

Composite
Score

+89

Emotional Footprint

Emotional
Footprint

87%

Likeliness to Recommend

Likeliness
to Recommend

25Reviews

SAP

SAP Access Control

Streamline the process of managing and validating user access to applications and data – with SAP Access Control. Our access governance software automates user provisioning and can help you certify access, embed preventative policy checks, and monitor reviews of emergency access activities – all with minimal support from IT.

--

Composite Score

Composite
Score

+86

Emotional Footprint

Emotional
Footprint

89%

Likeliness to Recommend

Likeliness
to Recommend

8Reviews

Bradford Networks

Bradford Networks

Network Sentry/RTR leverages its unique Live Inventory of Network Connections (LINC) to automatically correlate high fidelity security alerts from the leading firewall and Advanced Threat Detection solutions, including FireEye, Fortinet, and Palo Alto Networks, with detailed contextual information on compromised endpoints, users and applications.

--

Composite Score

Composite
Score

+46

Emotional Footprint

Emotional
Footprint

67%

Likeliness to Recommend

Likeliness
to Recommend

6Reviews

Hewlett-Packard Enterprise

HP Aruba ClarPas Policy Manager

ClearPass Policy Manager provides secure network access in a world made up of mobile and IoT devices. It features ultra-scalable AAA with RADIUS and uses contextual data based on every user and device to enforce adaptive policies for wireless, wired or VPN access.

--

Composite Score

Composite
Score

+97

Emotional Footprint

Emotional
Footprint

95%

Likeliness to Recommend

Likeliness
to Recommend

4Reviews

Avaya

Avaya Access Control

Avaya’s network access and identity management software products perform a range of critical functions to administer corporate policies, security requirements, and regulatory compliance standards. An intuitive interface provides granular control for setting and applying policies that can enable appropriate access and support BYOD, while protecting your network from unwanted intrusion.

--

Composite Score

Composite
Score

+36

Emotional Footprint

Emotional
Footprint

73%

Likeliness to Recommend

Likeliness
to Recommend

4Reviews

Extreme Networks

Extreme Network Access Control

A multi-vendor solution that provides an unparalleled range of choices for fine grained network access control.

--

Composite Score

Composite
Score

-27

Emotional Footprint

Emotional
Footprint

40%

Likeliness to Recommend

Likeliness
to Recommend

2Reviews

ForeScout Technologies

ForeScout CounterACT

ForeScout CounterACT™ expands the capabilities—and meaning—of network access control. CounterACT provides real-time visibility of users, devices, operating systems and applications that are connected to the network.

--

Composite Score

Composite
Score

+96

Emotional Footprint

Emotional
Footprint

100%

Likeliness to Recommend

Likeliness
to Recommend

1Reviews