Network Access Control (NAC) features Reviews

Showing reviews of the top ranking products in Network Access Control (NAC), containing the term features
Portnox CORE: features
IS
Consulting Principal at a transportation company with 501-1,000 employees

The user interface is very convenient.

View full review »
JF
Security Analyst at a financial services firm with 201-500 employees

NAS view page gave a virtual graphical view of the switches, similar to the physical view, and just like how you see the ports on them. 

There is an add-on feature for application control to kill unwanted applications when launched on a user's device.

It has a feature to check the compliance state of computers. An example is for an antivirus. It checks if it was installed, installed but not running, or not installed, then it defines policy action based on compliance status, which it applies.

It supports a good number of known antivirus products.

It has scheduling reports for backward review of incidents.

Its knowledge base refers you to similar tickets or solutions.

View full review »
Systems & Support Engineer at CWG Plc

Great visibility on who and what is connected or joined the network at any one time. This also allows for security posture attainment because of the profiling features of Portnox Core that allow for a particular endpoint update baseline to join the network or be quarantine until the baseline is met

View full review »
Sophos Network Access Control: features
CEO at MARVIV SRLS

The scalability of the system and the performance of the system and the solution's most valuable features.

View full review »
Manager at a financial services firm with 201-500 employees

Sophos has an endpoint side, a firewall side, access control, and a phishing side. It is an entire network security solution.

What Sophos has done is integrate almost the entire OSI layer infrastructure. It gives me visibility across my infrastructure. It gives me visibility into all the mobile devices that are on my network and into the security I have on those mobile devices. I also have visibility into my users, my servers, and into what is happening at all my gateways, as well as visibility on my switches. So it gives me a global view of my infrastructure.

The beautiful thing about it is that it has an integration between the endpoint and the firewall. So if any of my endpoints, systems like desktops or laptops, does not have an updated patch, it will be disconnected from the network.

View full review »
E
Security Analyst at a tech company with 11-50 employees

There is really good visibility for the appliance. They also have a single management solution be it on-premise or in the cloud. We've been able to manage it from a single solution.

View full review »
E
Security Analyst at a tech company with 11-50 employees

The solution offers very good visibility.

The fact that it is a single management solution is quite useful. Whether it's on-premises or on the cloud, we're able to manage it centrally.

The solution is quite user-friendly.

View full review »
HJ
IT Network Engineer at a tech services company with 51-200 employees

The user interface makes it easy to configure and use.

The troubleshooting tool is helpful.

Technical support is fast and they have been good at resolving our problems.

View full review »
Technical Operations Manager at a tech services company with 51-200 employees

The feature I love the most is probably the wifi. The wifi control is fantastic and makes it very easy to administer. The security is also top-notch. Since we've been using this product, we've not had any problems with regards to threats. I'm very happy with this solution.

View full review »
CEO at MARVIV SRLS

The feature that I like the best is the level of security that it can provide.

The interface is very user-friendly and it makes it easy to manage the product due to the fact that you have complete control over the system and you can set up everything in a very easy way.

The solution is quite scalable. You can expand it if you need to. It's designed to be modular.

We've found the solution to be very stable. The performance is great.

The installation is very straightforward.

View full review »
Aruba ClearPass: features
Project Engineer at a tech services company with 501-1,000 employees

The most valuable feature is flexibility as it supports solutions from multiple vendors.

View full review »
Networking Architect at Telia Lietuva, AB

One of the most valuable features of the solution is the maturity of the product and, of course, the functionality is also very good. 

View full review »
CTO at Kingsway Hospitals

The most valuable features are planning and analytics.

It is simple to deploy.

It is transparent for the users to come in through ClearPass.

View full review »
FL
Architecte Système at a tech services company with 1,001-5,000 employees

The solution is extremely stable.

We find that at the end of the projects we manage, all functionalities perform quite well. We've tested it a lot and find it to be overall a very good solution.

It's excellent in terms of securing local networks for our clients.

View full review »
JL
Assistant Lead Engineer at a tech services company with 1,001-5,000 employees

The interface is very easy to use and the workflow is quite straightforward.

View full review »
RF
Technical Department at Telenor Comunicaciones

The aspect of Aruba ClearPass that I like most is that it has a lot of options, it is very versatile.

View full review »
Forescout Platform: features
System Engineer at Maticmind S.p.A.

The last two or three versions that have been released on CounterACT Forescout have allowed for the possibility to search for any kind of device. Before that, I could only search for guest domain users.

View full review »
Director of Information Technology at a government with 201-500 employees

The most valuable feature is the blocking of USB devices.

View full review »
IU
Chief Information Security Officer at a tech services company with 501-1,000 employees

It's a great solution. We use it for the internet here and it's been helpful. It's a great product for our Mac PCs and we can implement it to both our wireless and our wired network.

It's very quick.

The compliance aspects of the solution are excellent and one of the solution's best features. It helps us maintain the compliance of our endpoints.

In terms of physical tools, we are very satisfied.

In our organization, the solution provides us with a sound perimeter. 

The user interface is quite simple.

The version we're currently on, 8.6, has a lot more plugins than past versions. Now you can plug in anything you want. It helps us to utilize the product more fully.

View full review »
Owner at Securnet

We are using the Forescout Platform mostly for the Bring Your Own Device features. So we like it very much. We like the dashboard, the usability, and the Bring Your Own Device feature. That's our main usage of the Forescout.

View full review »
SD
Chief Technology Officer at Penta Global Limited

The solution offers very good management.

It allows for good detection of all the vendor products we have on-site.

The solution is very similar to other solutions, so it's not hard to figure out how to use it.

View full review »
AA
Chief Executive Officer at a tech services company with 11-50 employees

We really like that we get full visibility of devices in the local network.

View full review »
Sr. Network Engineer at William Blair & Company

The key feature we use is AD integration. That feature needs the least amount of attention once set up. 

Monitoring and logging are the pieces that we use most day-to-day. These are used by both our network and security teams to ensure proper operation with minimal risk. Whether machines attempting access are firm managed, vendors visiting, or IoT, all are available within the CA appliance. We plan to extend the use to further support growth functionalities and new work from home initiatives going forward.

View full review »
Senior Network Engineer at Tessy Plastics

The biggest benefit to our organization is the fact that being in manufacturing you have many different types of devices. Only a small section of these types of devices support dot1x authentication. This makes Network Access Control very difficult to implement. With Forescout, the difficulty becomes significantly less. Being able to actively identify the client without a certificate allows you to control every device on your network regardless of the make, model, and software running. This allows for end-to-end security.

View full review »
DO
Senior Security Engineer at a healthcare company with 10,001+ employees

There are so many to list: 

  • The policies and what you can do with them is amazing. 
  • The ability to narrow down devices online versus offline.
  • Get the MAC Addresses last attributed with a device or IP address on a device and connect that to its switch port or router. This is very beneficial when assisting in tracing back physical connectivity, if needed. 
  • The ability to move a device off the network is very useful. The hardest part is showing the help desk what they need to do when troubleshooting a device connectivity issue.
View full review »
Head IT Infrastructure and Security at United Capital Plc

Access control: Being able to set policies that determine how devices join our network and how they are expected to behave while on the network. The fact that we are able to access the hygiene of our endpoint and monitor it continuously makes it fit for purpose.

View full review »
Sr. Security Engineer at Topvision

The interface is easy to use.

The 802.1X configuration, which is difficult for all switches, is not required. It makes it easier to work with switches and IoT devices.

View full review »
CA
Product Manager - IT Security at a tech services company with 11-50 employees

Its feature that I have found most valuable is that it is very granular. You can configure granular controls just as you want those policies to be implemented. It gives you that flexibility to go granular in how you want your controls to be implemented. That's something I like about it. 

The pricing, technical support, stability, scalability, initial set up, interface, dashboards, management, and monitoring are fantastic. They are excellent. 

The licensing of the solution is pretty simple. The process of deploying the solution is pretty straightforward. The dashboard, in terms of monitoring and management, is pretty simple. Maybe because I have a very robust technological background is why I don't struggle with these things. In terms of management, deployment, and support, although I really don't require their support, so far, so good.

View full review »
Product Manager at South Asian Technologies

The solution's most valuable aspects are its network visibility and its ability to extend into other solutions for integration purposes. 

The initial setup is quite simple. It's not too complex or difficult to set up.

View full review »
BS
GM Technical Management at a tech services company with 201-500 employees

The most valuable feature is the ease of deployment, which does not require the use of an agent.

We are satisfied with the interface.

View full review »
Senior Network Engineer at a government with 5,001-10,000 employees

I think the most valuable feature is that the port-based 802.1x configuration on switch ports is not required. It operates by listening to the wire and talking to networking devices. That is a huge reduction in configuration complexity.

You can quickly filter your view of devices and zero in on the ones you want using a variety of tools, such as what subnet it is on or what it has been classified as.

Another good thing about the product that it can examine every endpoint and give information about it, even IoT devices.

View full review »
Ingeniero Senior en seguridad y telecomunicaciones at a non-tech company with 1,001-5,000 employees

The environment was easy to configure. 

The user management has been very easy for the most part.

The initial setup is pretty easy.

Technical support has been very helpful.

The stability overall is good.

View full review »
Fortinet FortiNAC: features
System Security Engineer at a tech services company with 11-50 employees

Compliance checks are a good feature. Compliance check is for windows updates and for antivirus updates, etc. 

Security is also good. No guest can enter without credentials, such as usernames and passwords. You have full visibility, which is very good.

View full review »
Sr. Network Architect at a manufacturing company with 10,001+ employees

The interface is good and simple to use. Some of the ideas presented on the online course could be clearer, like policy creation. But the interface and other features are very good. 

View full review »
RS
Senior Cybersecurity Solution Architect at a computer software company with 10,001+ employees

We are only consultants, so we implement FortiNAC for our customers. The good part about FortiNAC is that it works seamlessly across either public cloud, private cloud, a hybrid one or on premises. So, depending on the client's requirements, I usually suggest that they go for public cloud where they have remote locations, and that they go for an application where they have a large deployment, adequate network and technical staff to support the requests.

The features we generally propose is basically agent-based authentication and the agent case solution product for wireless endpoints, which allow them to do automatic registration, and the third would be the health checks.

View full review »
Technical Presales Engineer at Dristi Tech Pvt.ltd

The most valuable features of the solution are the user-friendliness, the graphical interface, and the technical support. The interface is very nice and the customization is good.

Overall, our clients seem to be quite pleased with the product.

View full review »
Cyber Security Specialist at a tech services company with 51-200 employees

There are quite a number of things that are valuable about this solution. Having dealt with Cisco ISE, I realize that FortiNAC is different in a way that gives you granular visibility of the entire network infrastructure related to IOT devices (Who, What, When, Which information). It's helpful that you can know what's going on from your phone, your tablet, and from home. The solution provides containment, reporting and security event-alarm mapping and saves log and carries out further analysis for cyber thefts. It really is a good solution.

View full review »
AM
Technology Consultant Team Head at Ignite Solutions

This solution is very easy to implement and use.

The interface is user-friendly.

The most valuable feature for us is the support for iOS and iPhones.

View full review »
MA
Asst. Network Security Engineer at a tech services company with 11-50 employees

The most valuable features are usability and security.

View full review »
Presales Engineer at a tech services company with 11-50 employees

The most valuable features are the ease of deployment and ease of use.

The reporting is good.

View full review »
JF
Cyber Security Engineer at a tech services company with 201-500 employees

It expands authentication. It's incredibly good with profiling and onboarding methods.

View full review »
Cisco ISE (Identity Services Engine): features
TP
Technical Systems Analyst at NJC

The biggest value of ISE is that it can get so granular with gaming systems, versus IoT and BYOD.

View full review »
BA
Corporate Information Technology Security Manager at a financial services firm with 10,001+ employees

ISE integrates well with other Cisco products.

View full review »
AA
Network Engineer at a financial services firm with 1,001-5,000 employees

The feature that I most like is that it can notify me whenever someone plugs in their device, which is not allowed. I get notifications for new laptop devices.

I think the user interface looks good compared to previous versions. 

View full review »
Infrastructure and Cybersecurity Manager at George Washington's Mount Vernon

The solution cuts down on the repercussions of getting malware or ransomware which happened to us four years ago. We regularly took very aggressive snapshots and we were able to recover in an hour and 20 minutes without any loss of data.

View full review »
Network & Security Architect at Canac IT

The .1x authentication schema is the most valuable aspect of the solution. It makes it possible to have multiple policies and it can still adapt to us. We can authenticate and calculate our trajectory and so on. The policy is very easy to put in place. It's got to be easy due to the fact that we have more than 200,000 devices.

The implementation is very simple.

View full review »
RF
Cyber Security at a manufacturing company with 10,001+ employees

To be clear, I'm not an expert in networking, so I'm pretty much like a user.

I really like the guest WiFi. Those kinds of features are pretty convenient. When I have a guest in the form of a third party, I can grant access to the guest for a certain period of time and have a dynamic password generated. It's great.

The user experience of the solution is great. It's a very transparent system.

View full review »
Technology Manager at Advanced Integrated Systems

We are a system integrator and Cisco ISE is one of the products that we sell and implement at our customers side. I have built ISE's POC and provided training to our customers.

I also used real rent lab which was including; Active Directory integration, network access and core switches, access points, wireless access controller, and end points. (some end points have cisco client - anyconnect, and have not), and Web Server for creating wireless authentication portal solution end to end

The AAA features were awesome and have important attributes, and also the security groups (SGTs) concept to enforce policies for each group of users, regardless they coming via wired or wireless network devices. also i see the guest authentication is very rich and easy tom implement 

View full review »
MB
Senior Solutions Manager at a computer software company with 1,001-5,000 employees

The interconnection with the ecosystem and the ability to force rules all over the network are the most important features.

View full review »
Head Cyber Security at a retailer with 10,001+ employees

It's flexible and stable. It's been good as a standard environment to run.

View full review »
Project Manager at Projectnet

One of the most important features is the authentication security for the individual connection to the network through their computer or laptop. The solution is very complete overall.

View full review »
VP of IT at proinf networks pvt ltd

This product allows them to see the traffic that is going through the network.

It is stable and easy to use.

View full review »
CW
Network Infrastructure Specialist at a tech services company with 51-200 employees

The posturing is the solution's most important aspect. When a user connects his or her machine to the network, the first is for ISE to check whether that machine is authorized, check that that machine is compliant with respect to antiviruses, whether it complies with respect to Windows updates, et cetera. If not, a feature is on auto-remediation, so that the proper antivirus and Windows updates can be pushed to the machine.

At the moment, ISE seems to integrate very well with a number of other technologies. It integrates well with Microsoft and integrates well with other wireless systems.

View full review »
AV
Solution Architect Telecom at a manufacturing company with 10,001+ employees

The actual radius is the most valuable aspect of the solution. We need to have a centric solution either on MarTech X and for the wireless user authentication. We were mainly on Cisco and we continue to use them. However, this is the time period for a refresh as the five-year lifespan is completed. We may look for other options.

Technical support is okay.

View full review »
Technology Manager at Advanced Integrated Systems

I like the guest access feature, which has been important for us. The BYOD feature is also good. 

View full review »
BN
Senior Software Engineer with 501-1,000 employees

My clients are always talking about the segregation capabilities. Segmentation refers to how you can actually segregate employee and non-employee client access. 

View full review »
MA
Associate Consultant at a computer software company with 201-500 employees

In terms of features, I think they've done a lot of improvement on the graphical user interface — it looks really good right now. ISE is always very complicated to deploy because it's GUI-based. So they came up with this feature called work centers, that kind of streamlines that process. That's a good feature in the product right now.

View full review »
Deputy Head of IT at a legal firm with 501-1,000 employees

The way we can trust this solution is the most valuable. We have no issue with this product. It is a competitive product. You need to have a very good and deep knowledge of the product to take the full benefits of all the features, but it is a good product.

View full review »
IT Security manager at a energy/utilities company with 201-500 employees

The ability to integrate our Cisco AnyConnect connections to the active directory has been great. Also, as a source of authentication during the process of logging into Cisco AnyConnect has been very useful for us. 

View full review »
BH
Chief Technology Officer at a tech services company with 11-50 employees

I have found that all of the features are valuable.

It is very easy to deploy because we are able to port users directly from Active Directory (AD) and LDAP.

View full review »
Senior Infrastructure Consultant at Happiest Minds Technologies

The most valuable features are the NAC and the bundles that are available with Cisco ISE, such as Cisco ACS being integrated.

View full review »
IT Manager at CMC

The most valuable features are the ability to retrieve information about Active Directory user names, viewing the log files to see which MAC address tried to connect with the created SSIDs, portal designing for your company, hotspot tools, and creating network rules for WiFi access.

View full review »
SZ
Team Lead Network Infrastructure at a tech services company with 1-10 employees

The solution is stable.

We have found the product to be scalable.

The device administration is great. 

It offers very good integrations and can easily be integrated with mobile devices.

The product works well with StealthWatch.

It's quite an innovative product.

Typically, the installation is pretty simple.

View full review »
ExtremeControl: features
Presales Engineer at soulco

The most valuable aspect of the product is that I can know which end users are using which features, the type they are using, and the kind of traffic coming through, even when we're in our network. I have that recognition which is great. 

View full review »
Ruckus Cloudpath: features
YG
Assistant Manager-Presales at a tech services company with 11-50 employees

I find the solution to be very rich in features. Some examples include great guest authentication, authorization, port-string, and network access control.

View full review »
Board Member Executive at Daxa

The solution is easy to use, well designed, robust, and has good traffic capacity.

View full review »
Pulse Policy Secure: features
TA
Cyber Security Consultant at a tech services company with 11-50 employees

There is documentation available that can assist in understanding the product.

Integration with other vendors is possible.

View full review »
F5 BIG-IP Access Policy Manager (APM): features
AL
Cyber Security Solution Architect at a tech consulting company with 1,001-5,000 employees

F5 is great for handling complex issues. Most of our big customers, including banks and insurance companies like it, because it's such a robust platform that enables them to do almost anything. 

Also, the new GUI seems to be very quick and simple for users, and our customers appreciate speed.

View full review »
LH
Presale Engineer at a comms service provider with 11-50 employees

This is a product that is easy to install and integrate, and it is simple to use.

The most valuable feature is the SSL VPN.

It allows you remote access to applications, such as those from Microsoft, as well as to our internal website.

View full review »