Get current news, industry tips and helpful information
Dynamic NAC provides the benefits of NAC while being extremely
easy to install and maintain. Installation can be done in less than
an hour without the need to change the network. Dynamic NAC offers
a rich set of NAC features including centralized management, flexible
policies, quarantining rogue endpoints, and identifying valid devices.
Dynamic NAC is part of the CyberGatekeeper family, which provides
comprehensive network access control for the corporate network.
|NAC solution for wired and wireless LANs||Only allows authorized devices to access the
network. Controls guest access, performs automatic remediation,
validates configuration. Supports WLAN and LAN access.
|Compatible with existing
network equipment, network devices, and users
|Dynamic NAC is compatible
with the existing LAN and WLAN, requiring no network upgrades
or reconfiguration. Dynamic NAC works with unmanaged switches,
managed switches, and hubs. DNAC is compatible with printers,
embedded devices, and PCs. DNAC also supports guest access to
|Easy to deploy and maintain||Dynamic NAC can be installed in
as little as an hour, and usually requires no changes to existing
routers or switches. Dynamic NAC only requires agents on endpoints
that will be acting as enforcers, and extra validation and protection
is available when installed on more endpoints.
|Central Policy Management||Administrators use a central policy manager to
develop, deploy and manage policies. The policy manager lets
administrators use the included tests, or customize tests to
meet specific requirements.
|Continuous Monitoring and Enforcement||CyberGatekeeper monitors continuously, ensuring
devices remain compliant at all times. Devices that become non-compliant
are immediately quarantined.
Automatic and Manual Remediation
|Non-compliant devices are quickly
repaired through automated and interactive remediation options.
These options can display messages or install updates to repair
|Guest Support||Dynamic agents can be run from Firefox
or Internet Explorer, allowing guests to access the network.
Unknown devices can be identified and quarantined.