Network Access Control Control unauthorized, guest, and non-compliant computers
Network Access Control enables you to control who and what is allowed onto your network; blocking unauthorized users, controlling guest access, and ensuring compliance with your company’s security policy for employees.
Improve security by controlling network access
By implementing Network Access Control (NAC) you reduce the risk of unauthorized, guest, non-compliant, or infected systems compromising your network. A NAC solution gives you a framework to ensure that only correctly secured computers gain network access.
Fixed, mobile, wired or wireless computers connecting to the network can be detected and managed suitably with NAC in place. If operating systems are unpatched, personal firewalls are turned off, or unauthorized applications are being used, access to your network can be denied.
Sophos keeps NAC simple
Our technology uses your current network infrastructure thus reducing implementation time and the costs associated with hardware upgrades or investments in endpoint security. You gain increased proactive protection of your network and a reduction in the cost of identifying and repairing non-compliant systems.
Sophos and Network Access Control
Sophos NAC Advanced 3.0 combines powerful assessment and reporting tools with comprehensive policy enforcement capabilities. Key functions include:
Predefined assessments covering more than 400 security applications and more than 600 OS patches with point-and-click inclusion into policy
“Is current” functionality automatically updates anti-virus and anti-spyware applications, enabling administrators to set up a policy once and then forget about it
Rapid response to new and unforeseen threats using custom application creation and enforcement
Designed with flexibility and ease of use in mind, Sophos NAC Advanced is centrally managed through an intuitive web interface. System administrators can create and manage policies that can be applied to individuals who may have access to the network, either via an installed or web-based agent. Computers can be permitted or denied access to the network, or quarantined, messaged and automatically remediated.