Aruba Clearpass Network Access Control

ClearPass delivers both protection and efficiency for Aruba SD-Branch.
One place to see and manage all.
Adaptive foundation security and services.
Detects threats before they can do damage.

HYBRID WORK AND IoT ARE CHANGING HOW WE THINK ABOUT ACCESS CONTROL

Hybrid workplace initiatives, IoT, and edge computing are dissolving the traditional IT perimeter. The goal for organizations is to provide anytime, anywhere connectivity without sacrificing security and maintaining visibility and control without impacting user experience.

It starts with identifying everything connecting to the network, authenticating and authorizing them, and enforcing robust policy across network.

Identify

Identify what clients are being used, how many, where they’re connecting from, and which operating systems are supported – this provides the foundation of visibil­ity. For many purpose-built loT devices, such as those found in a hospital or manufacturing plant, understand­ing the actual behaviour of the device is the only way to accurately identify them. Continuous insight into the enterprise-wide device landscape and potential device security corruption, as well as which elements come and go, gives you the visibility required over time to secure network endpoints.

Authenticate and authorize

Authenticate and authorize the devices connecting to the network, applying Zero Trust best practices related to “least access”. Define and apply access control policies that provide proper user and device access, regardless of user, device type or location; this provides an expect­ed user experience. Organizations must adapt to today’s evolving devices and their use – whether the device is a smartphone or surveillance camera.

Enforce

Enforce automated response via dynamic policy con­trols and real-time threat remediation that extends to third-party systems. This is the last piece of the puzzle. Being prepared for unusual network behavior at 3 AM requires a unified approach that can block traffic and change the status of a device’s connection.

True security only occurs when there is overarching visibility and control – ensuring that only authenticated or authorized devices connect to the network. This stems from a multi-vendor, wired and wireless per device policy.

Key Features

High-quality performance, load balancing, and scalability

Role-based access management for multi-vendor wired and wireless networks.

MDM integration, NAC support, and Microsoft Network Access Protection (NAP) health checks.

SAML v2.0 which enables both auto and single sign-on.

Real time tracking and reporting of device access, user authentication attempts, and failures.

APIs for easy integration with third party services such as internet security and SIEM.

Detailed device profiling and automatic on-boarding

Guest access management with convenient customization options.

Learn how to plan for today’s challenges.

Improve branch-wide savings by managing SD-WAN, WLAN, and LAN with a single pane of glass.

Contact us today