Securing The Edge, Fast & Accurate.
A level of visibility that will transform your network security.
Control users & devices across your networks with granular visibility & in-depth control
LESS TOUCH, GREATER RESULTS
Secure Any IP-Enabled Devices, No Matter What.
ACTIONABLE
DEVICE PLATFORM INTELLIGENCE
DYNAMIC
NETWORK ACCESS CONTROL
SEAMLESS
IT SECURITY AUTOMATION
Without securing devices, from a multitude of legacy devices to great wave of IoT devices at the edge, you will not be able to build the foundational cybersecurity framework required for securing your evolving networks.
NETWORK SURVEILLANCE
NETWORK SURVEILLANCE
Genian NAC can monitor IP-enabled devices on your network in real-time using a non-disruptive Layer 2 based Network Sensor and classifies those devices and their users into logical groups based on your business requirements. Genian NAC has the intelligence to sort out a wide range of network-connected devices and their states to present immediate, meaningful, and actionable information.
DEVICE PLATFORM INTELLIGENCE (DPI)
DEVICE PLATFORM INTELLIGENCE (DPI)
“Device Platform” refers to any hardware or software, or any combination of hardware and software (OS), used to access a network.
Genian NAC incorporated with Device Platform Intelligence (DPI) can present the most accurate device identity, its contextual, and its risk information in order to enhance network visibility and secure network access for the IoT era. DPI can be shared through the Genians Cloud.
NETWORK ACCESS CONTROL
NETWORK ACCESS CONTROL
Genian NAC leverages multiple techniques to enforce IT security policies dynamically using contextual information (What, Who, When, Where, How) to quarantine any non-compliant devices and remediate them to be compliant through automated processes.
MOBILE, BYOD, GUEST
MOBILE, BYOD, GUEST
In the hyper-connected world of the Internet of Things (IoT), organizations are grappling with implementing Bring Your Own Device (BYOD) initiatives to deal with the rapidly evolving and increasingly complex tsunami of mobile devices, from laptops and tablets to other smart ”Things”, such as phones, watches, cars and more. Genian NAC can provide flexible and secure network access, wherever you are located, and for whatever devices you bring to the network.
IP ADDRESS MANAGEMENT (IPAM)
IP ADDRESS MANAGEMENT (IPAM)
Through our intuitive IP matrix interface (Class C Subnet mask), see how many IP addresses are being used and available, which IP’s are assigned via DHCP, which are reserved, and more.
SWITCH PORT MANAGEMENT
SWITCH PORT MANAGEMENT
See how many devices are connected to specific ports, their connection status, port-level security, 802.1x information, traffic, utilization and more. Using 802.1x port-based access control, control any ports connected to non-compliant devices.
WLAN SECURITY
WLAN SECURITY
Genians’ Network Sensor has the capability of scanning all SSIDs in your network and identifying who connects to which SSIDs, capturing not only your organization’s APs but also neighboring APs and controlling what is connecting to those APs. You can allow or deny Wifi-enabled devices accessing different SSIDs based on their policy compliance by groups, such as Authorized AP, Rogue AP, Misconfigured AP, Tethering device, and more
ENDPOINT SECURITY
ENDPOINT SECURITY
Manage all desktop configurations, applications, OS Updates, peripheral devices, wireless connections and more. Standardize the configuration of corporate-owned devices automatically and control them remotely.
IT SECURITY AUTOMATION
IT SECURITY AUTOMATION
Genian NAC integrates a wide range of IT security and business solutions (Firewall, VPN, IDS/IPS, VM, MDM, SIEM, APT, DLP, CRM/ERP, etc.) to ensure unified policy enforcement. Genian NAC supports custom integration using Webhook, REST API, and Syslog.
CRITICAL SECURITY CONTROLS (CIS) FOR EFFECTIVE CYBER DEFENSE
CRITICAL SECURITY CONTROLS (CIS) FOR EFFECTIVE CYBER DEFENSE
Cybersecurity compliance and the management of security risk are clearly two different things. Yet achieving the optimal cyber-defense framework for your organization requires that the two are managed in a mutually supportive fashion. Genians’ Next-Gen NAC supports this approach by leveraging the Center for Internet Security (CIS) Controls.
The CIS Controls provide global standards for cybersecurity. These have become recognized around the world for providing a set of best practices that can be leveraged to secure IT systems and data against attacks.
Device | Operating System | Security Agents | User | Application | Peripheral |
Type of device | OS Type | Anti-Malware/Virus/DLP Agents | Name | Installed | Type of device |
NIC Vendor | Version Number | Patch Management Agent | Authentication status | Running | Manufacturer |
Location | Patch Level | Encryption Agents | Workgroup | Location | Connection Type |
Connection Type | Services & Processes | Firewall Status | Email & Phone Number | Connection Type | Network |
Hardware Info | Installed Or Running | Configuration | File Sizes | Maligcious Traffic | |
MAC & IP Address | Registry | Rogue Devices | |||
Certificates | File Names, Dates, Sizes |
NEXT-GEN NETWORK ACCESS CONTROL
NEXT-GEN NETWORK ACCESS CONTROL
ILLUMINATE YOUR NETWORK
Without disturbing your existing IT network infrastructure, Genians Layer 2 based sensing technology powered by Device Platform Intelligence can surveil your entire network (Wired, Wireless, Virtual) in real time.
CLASSIFY YOUR NETWORK ASSETS
Node Grouping classifies all detected Node data into certain groups you can manage based on your business requirement in real time.
CONTROL NETWORK ACCESS
Once a targeted Node group is ready, specific policies can be applied to monitor the compliance posture. If a non-compliant device is detected, enforcement policy with appropriate actions (Block, Limit, Allow) can be executed.
the compliance posture. If a non-compliant device is detected, enforcement policy with appropriate actions (Block, Limit, Allow) can be executed.LOG ALL ACTIVITIES AND EVENTS
Network Sensor and Agent gathers all event information from the entire network and all with historical data are stored in Policy Server. Elastic-based search and filters help you to find out specific event data. The log data can be integrated with other security solutions like Next Generation Firewall, APT, SIEM, and EMM solutions.
XCELLHOST KEY CAPABILITIES
Management
Provisioning
Based Access Control
Server
Implementation cycle
XCELLHOST KEY BENEFITS
NON-DISRUPTIVE CONTROL TECHNOLOGY
Multi-Layered Dynamic Network Access Control
Problems with RADIUS based NAC
Layer 2 based Access Control
Compare NAC Architecture
With the result of comprehensive network visibility, Genians can ensure compliance from all connected devices by leveraging Virtual In-Line Packet Inspection which operates at Layer 2. This technology has complete control over endpoint device traffic over TCP and UDP by eliminating the need for complex configurations and network changes.
Also, Genians delivers all critical network access control features like IPAM, Switch Ports, WLAN security, Desktop configuration, IT asset, BYOD and Guest Management out of the box at the most affordable pricing options.