The user interface is very convenient.
Network Access Control (NAC) features Reviews
Showing reviews of the top ranking products in Network Access Control (NAC), containing the term features
Portnox CORE: features
Principcon67 says in a Portnox CORE review
Consulting Principal at a transportation company with 501-1,000 employees
reviewer989748 says in a Portnox CORE review
Security Analyst at a financial services firm with 201-500 employees
NAS view page gave a virtual graphical view of the switches, similar to the physical view, and just like how you see the ports on them.
There is an add-on feature for application control to kill unwanted applications when launched on a user's device.
It has a feature to check the compliance state of computers. An example is for an antivirus. It checks if it was installed, installed but not running, or not installed, then it defines policy action based on compliance status, which it applies.
It supports a good number of known antivirus products.
It has scheduling reports for backward review of incidents.
Its knowledge base refers you to similar tickets or solutions.
Great visibility on who and what is connected or joined the network at any one time. This also allows for security posture attainment because of the profiling features of Portnox Core that allow for a particular endpoint update baseline to join the network or be quarantine until the baseline is met
Sophos Network Access Control: features
The scalability of the system and the performance of the system and the solution's most valuable features.
Sophos has an endpoint side, a firewall side, access control, and a phishing side. It is an entire network security solution.
What Sophos has done is integrate almost the entire OSI layer infrastructure. It gives me visibility across my infrastructure. It gives me visibility into all the mobile devices that are on my network and into the security I have on those mobile devices. I also have visibility into my users, my servers, and into what is happening at all my gateways, as well as visibility on my switches. So it gives me a global view of my infrastructure.
The beautiful thing about it is that it has an integration between the endpoint and the firewall. So if any of my endpoints, systems like desktops or laptops, does not have an updated patch, it will be disconnected from the network.
There is really good visibility for the appliance. They also have a single management solution be it on-premise or in the cloud. We've been able to manage it from a single solution.
The solution offers very good visibility.
The fact that it is a single management solution is quite useful. Whether it's on-premises or on the cloud, we're able to manage it centrally.
The solution is quite user-friendly.
reviewer1345065 says in a Sophos Network Access Control review
IT Network Engineer at a tech services company with 51-200 employees
The user interface makes it easy to configure and use.
The troubleshooting tool is helpful.
Technical support is fast and they have been good at resolving our problems.
The feature I love the most is probably the wifi. The wifi control is fantastic and makes it very easy to administer. The security is also top-notch. Since we've been using this product, we've not had any problems with regards to threats. I'm very happy with this solution.
The feature that I like the best is the level of security that it can provide.
The interface is very user-friendly and it makes it easy to manage the product due to the fact that you have complete control over the system and you can set up everything in a very easy way.
The solution is quite scalable. You can expand it if you need to. It's designed to be modular.
We've found the solution to be very stable. The performance is great.
The installation is very straightforward.
Aruba ClearPass: features
The most valuable feature is flexibility as it supports solutions from multiple vendors.
One of the most valuable features of the solution is the maturity of the product and, of course, the functionality is also very good.
The most valuable features are planning and analytics.
It is simple to deploy.
It is transparent for the users to come in through ClearPass.
reviewer1364637 says in an Aruba ClearPass review
Architecte Système at a tech services company with 1,001-5,000 employees
The solution is extremely stable.
We find that at the end of the projects we manage, all functionalities perform quite well. We've tested it a lot and find it to be overall a very good solution.
It's excellent in terms of securing local networks for our clients.
reviewer1409682 says in an Aruba ClearPass review
Assistant Lead Engineer at a tech services company with 1,001-5,000 employees
The interface is very easy to use and the workflow is quite straightforward.
Forescout Platform: features
The last two or three versions that have been released on CounterACT Forescout have allowed for the possibility to search for any kind of device. Before that, I could only search for guest domain users.
The most valuable feature is the blocking of USB devices.
reviewer1155042 says in a Forescout Platform review
Chief Information Security Officer at a tech services company with 501-1,000 employees
It's a great solution. We use it for the internet here and it's been helpful. It's a great product for our Mac PCs and we can implement it to both our wireless and our wired network.
It's very quick.
The compliance aspects of the solution are excellent and one of the solution's best features. It helps us maintain the compliance of our endpoints.
In terms of physical tools, we are very satisfied.
In our organization, the solution provides us with a sound perimeter.
The user interface is quite simple.
The version we're currently on, 8.6, has a lot more plugins than past versions. Now you can plug in anything you want. It helps us to utilize the product more fully.
We are using the Forescout Platform mostly for the Bring Your Own Device features. So we like it very much. We like the dashboard, the usability, and the Bring Your Own Device feature. That's our main usage of the Forescout.
Surodas Deb Roy says in a Forescout Platform review
Chief Technology Officer at Penta Global Limited
The solution offers very good management.
It allows for good detection of all the vendor products we have on-site.
The solution is very similar to other solutions, so it's not hard to figure out how to use it.
reviewer1297917 says in a Forescout Platform review
Chief Executive Officer at a tech services company with 11-50 employees
We really like that we get full visibility of devices in the local network.
The key feature we use is AD integration. That feature needs the least amount of attention once set up.
Monitoring and logging are the pieces that we use most day-to-day. These are used by both our network and security teams to ensure proper operation with minimal risk. Whether machines attempting access are firm managed, vendors visiting, or IoT, all are available within the CA appliance. We plan to extend the use to further support growth functionalities and new work from home initiatives going forward.
The biggest benefit to our organization is the fact that being in manufacturing you have many different types of devices. Only a small section of these types of devices support dot1x authentication. This makes Network Access Control very difficult to implement. With Forescout, the difficulty becomes significantly less. Being able to actively identify the client without a certificate allows you to control every device on your network regardless of the make, model, and software running. This allows for end-to-end security.
SecEng3904 says in a Forescout Platform review
Senior Security Engineer at a healthcare company with 10,001+ employees
There are so many to list:
- The policies and what you can do with them is amazing.
- The ability to narrow down devices online versus offline.
- Get the MAC Addresses last attributed with a device or IP address on a device and connect that to its switch port or router. This is very beneficial when assisting in tracing back physical connectivity, if needed.
- The ability to move a device off the network is very useful. The hardest part is showing the help desk what they need to do when troubleshooting a device connectivity issue.
Access control: Being able to set policies that determine how devices join our network and how they are expected to behave while on the network. The fact that we are able to access the hygiene of our endpoint and monitor it continuously makes it fit for purpose.
The interface is easy to use.
The 802.1X configuration, which is difficult for all switches, is not required. It makes it easier to work with switches and IoT devices.
reviewer1363347 says in a Forescout Platform review
Product Manager - IT Security at a tech services company with 11-50 employees
Its feature that I have found most valuable is that it is very granular. You can configure granular controls just as you want those policies to be implemented. It gives you that flexibility to go granular in how you want your controls to be implemented. That's something I like about it.
The pricing, technical support, stability, scalability, initial set up, interface, dashboards, management, and monitoring are fantastic. They are excellent.
The licensing of the solution is pretty simple. The process of deploying the solution is pretty straightforward. The dashboard, in terms of monitoring and management, is pretty simple. Maybe because I have a very robust technological background is why I don't struggle with these things. In terms of management, deployment, and support, although I really don't require their support, so far, so good.
The solution's most valuable aspects are its network visibility and its ability to extend into other solutions for integration purposes.
The initial setup is quite simple. It's not too complex or difficult to set up.
reviewer1416408 says in a Forescout Platform review
GM Technical Management at a tech services company with 201-500 employees
The most valuable feature is the ease of deployment, which does not require the use of an agent.
We are satisfied with the interface.
I think the most valuable feature is that the port-based 802.1x configuration on switch ports is not required. It operates by listening to the wire and talking to networking devices. That is a huge reduction in configuration complexity.
You can quickly filter your view of devices and zero in on the ones you want using a variety of tools, such as what subnet it is on or what it has been classified as.
Another good thing about the product that it can examine every endpoint and give information about it, even IoT devices.
The environment was easy to configure.
The user management has been very easy for the most part.
The initial setup is pretty easy.
Technical support has been very helpful.
The stability overall is good.
Fortinet FortiNAC: features
Compliance checks are a good feature. Compliance check is for windows updates and for antivirus updates, etc.
Security is also good. No guest can enter without credentials, such as usernames and passwords. You have full visibility, which is very good.
The interface is good and simple to use. Some of the ideas presented on the online course could be clearer, like policy creation. But the interface and other features are very good.
reviewer1232502 says in a Fortinet FortiNAC review
Senior Cybersecurity Solution Architect at a computer software company with 10,001+ employees
We are only consultants, so we implement FortiNAC for our customers. The good part about FortiNAC is that it works seamlessly across either public cloud, private cloud, a hybrid one or on premises. So, depending on the client's requirements, I usually suggest that they go for public cloud where they have remote locations, and that they go for an application where they have a large deployment, adequate network and technical staff to support the requests.
The features we generally propose is basically agent-based authentication and the agent case solution product for wireless endpoints, which allow them to do automatic registration, and the third would be the health checks.
The most valuable features of the solution are the user-friendliness, the graphical interface, and the technical support. The interface is very nice and the customization is good.
Overall, our clients seem to be quite pleased with the product.
There are quite a number of things that are valuable about this solution. Having dealt with Cisco ISE, I realize that FortiNAC is different in a way that gives you granular visibility of the entire network infrastructure related to IOT devices (Who, What, When, Which information). It's helpful that you can know what's going on from your phone, your tablet, and from home. The solution provides containment, reporting and security event-alarm mapping and saves log and carries out further analysis for cyber thefts. It really is a good solution.
Ahmed Mahmoud says in a Fortinet FortiNAC review
Technology Consultant Team Head at Ignite Solutions
This solution is very easy to implement and use.
The interface is user-friendly.
The most valuable feature for us is the support for iOS and iPhones.
reviewer1181130 says in a Fortinet FortiNAC review
Asst. Network Security Engineer at a tech services company with 11-50 employees
The most valuable features are usability and security.
The most valuable features are the ease of deployment and ease of use.
The reporting is good.
Cisco ISE (Identity Services Engine): features
Technica4c57 says in a Cisco ISE (Identity Services Engine) review
Technical Systems Analyst at NJC
The biggest value of ISE is that it can get so granular with gaming systems, versus IoT and BYOD.
reviewer1186656 says in a Cisco ISE (Identity Services Engine) review
Corporate Information Technology Security Manager at a financial services firm with 10,001+ employees
ISE integrates well with other Cisco products.
reviewer1382571 says in a Cisco ISE (Identity Services Engine) review
Network Engineer at a financial services firm with 1,001-5,000 employees
The feature that I most like is that it can notify me whenever someone plugs in their device, which is not allowed. I get notifications for new laptop devices.
I think the user interface looks good compared to previous versions.
The solution cuts down on the repercussions of getting malware or ransomware which happened to us four years ago. We regularly took very aggressive snapshots and we were able to recover in an hour and 20 minutes without any loss of data.
The .1x authentication schema is the most valuable aspect of the solution. It makes it possible to have multiple policies and it can still adapt to us. We can authenticate and calculate our trajectory and so on. The policy is very easy to put in place. It's got to be easy due to the fact that we have more than 200,000 devices.
The implementation is very simple.
reviewer1394754 says in a Cisco ISE (Identity Services Engine) review
Cyber Security at a manufacturing company with 10,001+ employees
To be clear, I'm not an expert in networking, so I'm pretty much like a user.
I really like the guest WiFi. Those kinds of features are pretty convenient. When I have a guest in the form of a third party, I can grant access to the guest for a certain period of time and have a dynamic password generated. It's great.
The user experience of the solution is great. It's a very transparent system.
We are a system integrator and Cisco ISE is one of the products that we sell and implement at our customers side. I have built ISE's POC and provided training to our customers.
I also used real rent lab which was including; Active Directory integration, network access and core switches, access points, wireless access controller, and end points. (some end points have cisco client - anyconnect, and have not), and Web Server for creating wireless authentication portal solution end to end
The AAA features were awesome and have important attributes, and also the security groups (SGTs) concept to enforce policies for each group of users, regardless they coming via wired or wireless network devices. also i see the guest authentication is very rich and easy tom implement
reviewer1345848 says in a Cisco ISE (Identity Services Engine) review
Senior Solutions Manager at a computer software company with 1,001-5,000 employees
The interconnection with the ecosystem and the ability to force rules all over the network are the most important features.
It's flexible and stable. It's been good as a standard environment to run.
One of the most important features is the authentication security for the individual connection to the network through their computer or laptop. The solution is very complete overall.
This product allows them to see the traffic that is going through the network.
It is stable and easy to use.
ChrisWanyoike says in a Cisco ISE (Identity Services Engine) review
Network Infrastructure Specialist at a tech services company with 51-200 employees
The posturing is the solution's most important aspect. When a user connects his or her machine to the network, the first is for ISE to check whether that machine is authorized, check that that machine is compliant with respect to antiviruses, whether it complies with respect to Windows updates, et cetera. If not, a feature is on auto-remediation, so that the proper antivirus and Windows updates can be pushed to the machine.
At the moment, ISE seems to integrate very well with a number of other technologies. It integrates well with Microsoft and integrates well with other wireless systems.
reviewer1031016 says in a Cisco ISE (Identity Services Engine) review
Solution Architect Telecom at a manufacturing company with 10,001+ employees
The actual radius is the most valuable aspect of the solution. We need to have a centric solution either on MarTech X and for the wireless user authentication. We were mainly on Cisco and we continue to use them. However, this is the time period for a refresh as the five-year lifespan is completed. We may look for other options.
Technical support is okay.
I like the guest access feature, which has been important for us. The BYOD feature is also good.
reviewer779877 says in a Cisco ISE (Identity Services Engine) review
Senior Software Engineer with 501-1,000 employees
My clients are always talking about the segregation capabilities. Segmentation refers to how you can actually segregate employee and non-employee client access.
reviewer1261278 says in a Cisco ISE (Identity Services Engine) review
Associate Consultant at a computer software company with 201-500 employees
In terms of features, I think they've done a lot of improvement on the graphical user interface — it looks really good right now. ISE is always very complicated to deploy because it's GUI-based. So they came up with this feature called work centers, that kind of streamlines that process. That's a good feature in the product right now.
The way we can trust this solution is the most valuable. We have no issue with this product. It is a competitive product. You need to have a very good and deep knowledge of the product to take the full benefits of all the features, but it is a good product.
The ability to integrate our Cisco AnyConnect connections to the active directory has been great. Also, as a source of authentication during the process of logging into Cisco AnyConnect has been very useful for us.
reviewer1591416 says in a Cisco ISE (Identity Services Engine) review
Chief Technology Officer at a tech services company with 11-50 employees
I have found that all of the features are valuable.
It is very easy to deploy because we are able to port users directly from Active Directory (AD) and LDAP.
The most valuable features are the NAC and the bundles that are available with Cisco ISE, such as Cisco ACS being integrated.
The most valuable features are the ability to retrieve information about Active Directory user names, viewing the log files to see which MAC address tried to connect with the created SSIDs, portal designing for your company, hotspot tools, and creating network rules for WiFi access.
reviewer1461459 says in a Cisco ISE (Identity Services Engine) review
Team Lead Network Infrastructure at a tech services company with 1-10 employees
The solution is stable.
We have found the product to be scalable.
The device administration is great.
It offers very good integrations and can easily be integrated with mobile devices.
The product works well with StealthWatch.
It's quite an innovative product.
Typically, the installation is pretty simple.
The most valuable aspect of the product is that I can know which end users are using which features, the type they are using, and the kind of traffic coming through, even when we're in our network. I have that recognition which is great.
Ruckus Cloudpath: features
reviewer1466157 says in a Ruckus Cloudpath review
Assistant Manager-Presales at a tech services company with 11-50 employees
I find the solution to be very rich in features. Some examples include great guest authentication, authorization, port-string, and network access control.
Pulse Policy Secure: features
F5 BIG-IP Access Policy Manager (APM): features
reviewer1401780 says in a F5 BIG-IP Access Policy Manager (APM) review
Cyber Security Solution Architect at a tech consulting company with 1,001-5,000 employees
F5 is great for handling complex issues. Most of our big customers, including banks and insurance companies like it, because it's such a robust platform that enables them to do almost anything.
Also, the new GUI seems to be very quick and simple for users, and our customers appreciate speed.
reviewer1422600 says in a F5 BIG-IP Access Policy Manager (APM) review
Presale Engineer at a comms service provider with 11-50 employees
This is a product that is easy to install and integrate, and it is simple to use.
The most valuable feature is the SSL VPN.
It allows you remote access to applications, such as those from Microsoft, as well as to our internal website.