Securing The Edge, Fast & Accurate.


A level of visibility that will transform your network security.
Control users & devices across your networks with granular visibility & in-depth control

LESS TOUCH, GREATER RESULTS

Secure Any IP-Enabled Devices, No Matter What.

ACTIONABLE

DEVICE PLATFORM INTELLIGENCE

DYNAMIC

NETWORK ACCESS CONTROL

SEAMLESS

IT SECURITY AUTOMATION

Without securing devices, from a multitude of legacy devices to great wave of IoT devices at the edge, you will not be able to build the foundational cybersecurity framework required for securing your evolving networks.

Bootstrap demo
DeviceOperating SystemSecurity AgentsUserApplicationPeripheral
Type of deviceOS TypeAnti-Malware/Virus/DLP AgentsNameInstalledType of device
NIC VendorVersion NumberPatch Management AgentAuthentication statusRunningManufacturer
LocationPatch LevelEncryption AgentsWorkgroupLocationConnection Type
Connection TypeServices & ProcessesFirewall StatusEmail & Phone NumberConnection TypeNetwork
Hardware InfoInstalled Or RunningConfigurationFile SizesMaligcious Traffic
MAC & IP AddressRegistryRogue Devices
Certificates File Names, Dates, Sizes

NEXT-GEN NETWORK ACCESS CONTROL

ILLUMINATE YOUR NETWORK
CLASSIFY YOUR NETWORK ASSETS
CONTROL NETWORK ACCESS
LOG ALL ACTIVITIES AND EVENTS
ILLUMINATE YOUR NETWORK
ILLUMINATE YOUR NETWORK

Without disturbing your existing IT network infrastructure, Genians Layer 2 based sensing technology powered by Device Platform Intelligence can surveil your entire network (Wired, Wireless, Virtual) in real time.

Detect any IP-enabled Devices as a Node (MAC+ IP) with their most accurate platform name

Detect device platform’s network connectivity information like Switch Port, SSID

Discover device platform’s business context and risk information

Detect network anomaly (MAC Spoofing, Rogue Gateway, Ad-hoc)

CLASSIFY YOUR NETWORK ASSETS
CLASSIFY YOUR NETWORK ASSETS

Node Grouping classifies all detected Node data into certain groups you can manage based on your business requirement in real time.

Over 500 pre-defined conditions are provided to create Node groups. A Node can belong to multiple Groups

Each Nodes group can be used for policy management and compliance check to assess the current security practices

CONTROL NETWORK ACCESS
CONTROL NETWORK ACCESS

Once a targeted Node group is ready, specific policies can be applied to monitor the compliance posture. If a non-compliant device is detected, enforcement policy with appropriate actions (Block, Limit, Allow) can be executed.

the compliance posture. If a non-compliant device is detected, enforcement policy with appropriate actions (Block, Limit, Allow) can be executed.

Role-based Access Control

Multi-layered Access Control (ARP Spoofing, 802.1x, Port mirroring, Switch Port shutdown, Agent-based)

Built-in RADIUS, DHCP server

LOG ALL ACTIVITIES AND EVENTS
LOG ALL ACTIVITIES AND EVENTS

Network Sensor and Agent gathers all event information from the entire network and all with historical data are stored in Policy Server. Elastic-based search and filters help you to find out specific event data. The log data can be integrated with other security solutions like Next Generation Firewall, APT, SIEM, and EMM solutions.

Role-based Administrator

Personalized Dashboards using Over 100 Custom Widgets

Built-in Syslog Server

Integration via Webhook, REST API, and Syslog

XCELLHOST KEY CAPABILITIES

Self-Service
Onboarding & Device
Profiling

Guest & BYOD
Management


Automated Device
Provisioning


Policy-Based & Compliance
Based Access Control

Built-in RADIUS
Server

Accelerated
Implementation cycle


XCELLHOST KEY BENEFITS

Customize Your Protection

Flexibility & Scalability

Easy to manage & Interoperability

Controls All Connected Devices

Post-Admission Vulnerability Scan

Behavior Based Detection & NAC Management

NON-DISRUPTIVE CONTROL TECHNOLOGY

Multi-Layered Dynamic Network Access Control

Problems with RADIUS based NAC
Layer 2 based Access Control
Compare NAC Architecture

With the result of comprehensive network visibility, Genians can ensure compliance from all connected devices by leveraging Virtual In-Line Packet Inspection which operates at Layer 2. This technology has complete control over endpoint device traffic over TCP and UDP by eliminating the need for complex configurations and network changes.

Also, Genians delivers all critical network access control features like IPAM, Switch Ports, WLAN security, Desktop configuration, IT asset, BYOD and Guest Management out of the box at the most affordable pricing options.

NEXT-GEN NETWORK ACCESS CONTROL

Device Platform Intelligence

Accurate Platform Detection

Cloud-based DB Improvement

Asset Management

Windows, MacOS Agent

Collect Desktop Information (OS, HW, SW, Peripheral)

Dynamic Grouping

Over 500 conditions

Real-Time Update

Network Access Control

Dynamic Group-based packet filtering

802.1x RADIUS Server

IPAM, DHCP Server

Switch Port Control

Asset Management

Windows, MacOS Agent

Collect Desktop Information (OS, HW, SW, Peripheral)

BYOD & Guest Management

Captive Portal

Authentication

On-demand Registration

Desktop Management

Desktop Configuration

Windows Update

External Device Management

Wireless Connection Manager