Network Security Managment Platform - Key Features
- Based on Industry Standards
- Radius directory services. Support EAP-TLS, EAP-TTLS. PEAP and 802.1 X
- Manage Trusted Users and Trusted devices
- Management portal to manage trusted users who can access network resources using 802.1X
- Manage trusted corporate devices by issuing X.509 certificates
- Manage BYOD devices of employees
- Manage security policy
- Password complexity and expiry
- Filer based on Source IP address, Country of access or time of access
- Automatically block malicious attempts
- API access for Integration and interoperability
- Feature rich API access for integration with external services
- Secure, reliable, scalable and affordable Cloud services
- Scale your directory services without the hassle of hardware worries
- Secure and reliable hosting to ensure 99.999% uptime
- Monitor Directory service
- Monitor authentication attempts, success and failure
- Fingerprint access devices
- Alerts and logs for auditing
- Managed PKI services
- Issue X.509 Certificates
- Integrated PKI services
- Connect with external PKI services
- Manage Network Policy
- Secure wired port connection
- Flexible policy driven VLAN assignment
- Manage Inter site Roaming policy
- Gsuite/Office 365 Integration
- Import users from Gsuite/Office 365
- Provision or remove users to Suite/Office 365 from NETPASS
- Synchronize user profiles
Secure Network Access NETPASS - Feature Description
- Based on Industry Standards
- Provision of RADIUS directory services. RADIUS stands for Remote Authentication Dial-In User Service, that provides centralized (AAA) Authentication, Authorization, and Accounting management for users who connect and use a network service. It is also compatible with EAP-TLS, EAP-TTLS and PEAP methods to work with 802.1x.
- Manage Trusted Users and Trusted devices
- Network security defilement is at its all-time surge right now. You need to protect your data. We have provided a management portal that will manage trusted users who will be able to access network using 802.1x. Trusted corporate devices can be managed by issuing X.509 certificates. Devices of users or employees of your office can be managed with ease.
- Manage security policy
- For healthy networking and the flow of information, a solid security protocol is mandatory. We provide password complexity and expiry. Every last bit of information will be extracted and the filer will be based on source IP address, country of access or time of access. Not just that. Any malicious attempts to breach into the network will be automatically blocked at bay.
- API access for Integration and interoperability
- Integration and interoperability are one of the most important aspects when we talk about networking. Users will be provided with a feature-rich API (application program interface) access. API is basically the process of ensuring that calls with authenticated logins can enter an application program interface. All of this is necessary for integration with external services.
- Secure, reliable, scalable and affordable Cloud services
- We get it, it's always a hassle to keep yourself updated with the newest hardware or monitoring servers or backups. Look no further! This is a completely cloud-hosted solution with Zero IT hardware budget. The cloud services are secure, reliable, scalable and affordable. 99.999% uptime is a guarantee.
- Monitor Directory service
- An extremely high-quality monitor directory service where authentication attempts, success, and failures will be monitored every time. Devices can be accessed via fingerprint sensors and auditing will take place using alerts and logs.
- Managed PKI services
- PKI stands for Public Key Infrastructure which basically is a set of roles, policies, hardware, software and procedures required to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. You will be provided with Integrated PKI services and easily Issue X.509 Certificates. Accessing external PKI services can be done with minimal hassle.
- Manage Network Policy
- Provision of extremely efficient and secure wired port connections and VLAN assignments flexible to a higher degree. Moreover, the inter-site Roaming policy can be managed without any major complications.
- Gsuite/Office 365 Integration
- Users from Gsuite/Office 365 can be imported and also, users can be removed or provided to Suite/Office 365 from NETPASS. It's not even daunting to synchronize user profiles.
Solution To Secure Your Enterprise
- Manage WiFi Users and profiles.
- Password less WiFi Authentication using certificates.
- Manage Intra office WiFi roaming.
- Assign Policy driven dynamic VLAN to devices connected over WiFi.