Network Access Control

Network Access Control (NAC) is an endpoint security technology that manages a wide range of security functions. Elements include anti-X, vulnerability assessment, and network access profiling for user accounts in an enterprise environment.

The Data Quadrant is a thorough evaluation and ranking of all software in an individual category to compare platforms across multiple dimensions.

These include:

  • User Satisfaction Rankings
  • Business Value Scores
  • Vendor Capability Comparisons
  • Product Feature Evaluations

The Emotional Footprint is a powerful indicator of overall user sentiment toward the relationship with the vendor, capturing data across five dimensions.

These include:

  • Strategy and Innovation
  • Service Experience
  • Conflict Resolution
  • Product Impact
  • Negotiation and Contract

Still need assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Network Access Control Products

Filter by:

Hewlett-Packard Enterprise

HPE Aruba ClearPass Policy Manager

ClearPass Policy Manager provides secure network access in a world made up of mobile and IoT devices. It features ultra-scalable AAA with RADIUS and uses contextual data based on every user and device to enforce adaptive policies for wireless, wired or VPN access.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Bradford Networks

Bradford Networks

Network Sentry/RTR leverages its unique Live Inventory of Network Connections (LINC) to automatically correlate high fidelity security alerts from the leading firewall and Advanced Threat Detection solutions, including FireEye, Fortinet, and Palo Alto Networks, with detailed contextual information on compromised endpoints, users and applications.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Cisco Systems

Cisco Identity Services Engine

The Cisco® Identity Services Engine (ISE) helps IT professionals meet enterprise mobility challenges and protect the evolving network across the attack continuum. The market-leading platform for security-policy management, it unifies and automates access control to enforce compliance-driven role-based access to networks and network resources.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Extreme Networks

Extreme Network Access Control

A multi-vendor solution that provides an unparalleled range of choices for fine grained network access control.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Trustwave

Trustwave NAC

Through market-leading and patented technologies, Trustwave NAC enables granular control over network access and continuous monitoring of corporate-sanctioned and bring-your-own-device (BYOD) endpoints. This can help you to prevent the spread of malware and other threats that can harm infrastructure and leave your business vulnerable to attack and data loss.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

ForeScout Technologies

ForeScout CounterACT

ForeScout CounterACT™ expands the capabilities—and meaning—of network access control. CounterACT provides real-time visibility of users, devices, operating systems and applications that are connected to the network.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

DeepNines Technologies

DeepNines Network Admission Control

DeepNines Network Admission Control empowers security conscience organizations to inspect and detect all networked devices to ensure the device meets security policies without introducing the complexity, cost and management of an installed client, allowing comprehensive protection and control of user, non-user and guest devices. DeepNines NAC is a network-based product that eliminates all costs and complexities in managing client software.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Avaya

Avaya Access Control

Avaya’s network access and identity management software products perform a range of critical functions to administer corporate policies, security requirements, and regulatory compliance standards. An intuitive interface provides granular control for setting and applying policies that can enable appropriate access and support BYOD, while protecting your network from unwanted intrusion.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

InfoExpress

InfoExoress Dynamic NAC

Dynamic NAC is the Network Access Control solution that requires ZERO network changes, making it many times easier and faster to deploy than traditional NAC solutions. Dynamic NAC offers centralized management, flexible policies, granular quarantining and monitoring, and remediation of unhealthy systems.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

McAfee

McAfee Network Access Control Appliance

Maximize the effectiveness of your McAfee solution with McAfee Professional Services Architectural Review for McAfee Network Access Control. Our experts will carry out an architectural review of your environment, so that your solution is optimized to address the specific requirements of your infrastructure.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

IS Decisions

IS Decisions UserLock

Secure, control & audit user access to Microsoft Windows Server-based networks and protect the resources and data contained within. Strengthen network logon security to prevent unauthorized access to enterprise networks and stop security breaches from both the malicious and careless insider threat.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Portnox

Portnox Network Acess control

Portnox NAC is accurate because it traverses all networking layers – Ethernet, wireless, virtual, VPN and even the cloud to illuminate, visualize, analyze and control all connected users and devices. It speaks directly and natively with all existing switches, wireless access controllers, routers and firewalls to get a complete, 100% accurate view of all devices currently connected to the network. Nothing can hide.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

SAP

SAP Access Control

Streamline the process of managing and validating user access to applications and data – with SAP Access Control. Our access governance software automates user provisioning and can help you certify access, embed preventative policy checks, and monitor reviews of emergency access activities – all with minimal support from IT.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews

Auconet

Auconet BICS for Security

Auconet BICS is a comprehensive foundation for protection of today’s IT and SCADA networks – and yet it can typically be installed and operational within hours, not weeks. To ensure you maintain edge-to-edge security, BICS provides granular control of your entire infrastructure from a central, graphical-user interface (GUI). With BICS, all ports are automatically secured, and access is instantly controlled for each endpoint, based on your internal policies.

--

Composite Score

--

CX Score

--

Emotional Footprint

--

Likeliness to Recommend

0

Reviews