Network Access Control

100% Visibility and Device Control in Your Network
Network access control (NAC) is a method for securing networks by restricting network access to endpoint devices compliant to the security policies. As Next-Generation NAC’s evolved, their design and purpose changed significantly. NAC’s become platforms for addressing requirements in threat discovery, network visibility and Bring Your Own Device (BYOD).

Threat Discovery & Prevention

Vulnerable endpoints are often the easiest victims in cyberattacks. NAC is an effective tool for discovering security gaps in the network. When a threat is detected, NAC can execute different actions based on the created policies.

  • Send notifications.
  • Block network access.
  • Execute automated remediation actions.

A Next-Gen NAC provides threat intelligence and top-level visibility of the entire network in real-time.

Visibility

A NAC solution discovers and identifies all devices/users in the network before they are granted network access, requiring continuous monitoring of the network and devices connected to it.

The system enables the discovery, classification and, assessment of every device connected to the network. Configuration and security state of every device is monitored, ensuring that the network and devices are compliant to the organizational security policy.

BYOD

Bring Your Own Device (BYOD) is defined as allowing the employees to use their personal computers, mobile phones, tablet or other devices for work by an organisation.

Between 2019 and 2024, the expected yearly growth is 15% indicating unprecedented growth due to its possible benefits for end-users and organisations.

The reasons for growth are two-sided. Employees experience increased satisfaction, production and innovation, which is vital in today’s competitive landscape. Businesses also experience significant cost savings.

With the emergence of 5G, it is expected that BYOD will be adopted more widely but bringing other challenges parallel to this growth.

NetCyte is a next-generation NAC solution that provides dynamic and adaptive access control with unparalleled threat discovery.

DNSCyte is a recursive DNS Service based on global cyber threat intelligence and machine learning to block threats and targeted attacks in real time.

IDCyte is an identity management platform that includes Single Sign On (SSO), Multi-Factor Authentication (MFA) and biometric identity.

Challenges in Implementing NAC Solutions

Computer networks are challenging environments to deploy and manage NAC solutions.
Many rollouts are never fully completed, creating a high operational overhead and business impact.

Some of the typical challenges in deploying and managing NAC is summarised below:

  • Multiple and legacy networks with manageable and unmanageable network devices from many hardware vendors. (802.1x will not scale in these environments)
  • Multiple and large user directories.
  • A high number of heterogeneous devices demanding seamless and multiple connections methods.
  • Network devices without remote management or intelligence.
  • Old buildings and physical architecture.
  • Inability to control access in distributed networks with slow bandwidths.
  • Multiple and legacy networks with manageable and unmanageable network devices from many hardware vendors. (802.1x will not scale in these environments)
  • Multiple and large user directories.
  • A high number of heterogeneous devices demanding seamless and multiple connections methods.
  • Network devices without remote management or intelligence.
  • Old buildings and physical architecture.
  • Inability to control access in distributed networks with slow bandwidths.

Many NAC projects end up being used for basic device authentication. Inability to utilise NAC as a platform for security compliance and threat identification has emerged as one of the primary reasons for the limited deployment of NAC solutions.

The CyberCyte Solution

NetCyte is a next-generation NAC solution that provides dynamic and adaptive access
control with unparalleled threat discovery. NetCyte offers multiple methods for detection and blocking.

Detection
Track ARP & MAC Table from Network Devices: By just using the SNMP protocol, all devices are discovered and classified. Agentless classification without Admin rights is supported.
Port Mirroring: Ports which devices are active is mirrored. Through the mirrored port, devices are discovered. On distributed networks, this requires appliances in remote sites.
ARP & DHCP Sniffing: In this mode multicast ARP & DHCP packets are tracked through trunk ports. On distributed networks, this requires appliances in remote sites.
Blocking
SSH Command Execution for VLAN change or ACL application.
SNMP Execution for VLAN change.
TCP Reset if port mirroring is used.
802.1x.
ARP Redirection.
Architectural Advantages
Agentless for Windows, MAC and Linux devices.
Better scalability in Windows-based distributed networks.
Advanced threat discovery and prevention.
Ability to perform network device configuration.
Multiple methods for detection and prevention.
Ability to identify malicious traffic from guest devices without an agent or inline operation.

NetCyte Highlights

Ability to discover weak passwords in any device.
Detect port scans and password breach attempts without an agent installation or requiring an appliance on remote networks.
Track important audit data. Important security events like password changes, account lockouts, event log deletion and group membership changes can be discovered.
Advanced process analysis for discovering traffic flow.
Discover hubs/stacked devices in the infrastructure.
In-Depth inventory and threat discovery without an agent detailed than any of its competitor.
Ability to integrate with any network device supporting remote connection without any dependency.
Unprecedented scalability.
Different methods for discovery and blocking.
Easy discovery without depending on network devices or traffic sniffing.
Ability to identify malicious traffic from guest devices without an agent or inline operation.

Competitive Differences

NetCyte can do advanced threat analytics and weak password discovery without needing an agent or appliance on remote networks.
As the number of remote computers increases the agentless operation mode creates false alarms in competitor products. In large scale installations, agents are often installed to prevent false blockings. NetCyte is Windows-based, and Windows-to-Windows connections are much more efficient in large scale networks.
NetCyte can detect port scans and password breach attempts without an agent installation or requiring an appliance on remote networks.
NetCyte can track important audit data without an agent. Important security events like password changes, account lockouts, event log deletion and group membership
changes are recorded, and devices can be blocked if necessary.
Customizable scripting interface for executing commands on network devices enables organisations to manage possible issues related to command execution much more effectively.
Geolocation analysis enables the identification of traffic flow and process information for better visibility in identifying possible threats.
Ability to identify malicious traffic from guest devices without an agent or inline operation.
Would you like to learn more about how to protect your business?

We're member of 

We're member of

© 2019-2020 CyberCyte. All Rights Reserved.