Network access control software - List of Manufacturers, Suppliers, Companies and Products

Network access control software Product List

1~2 item / All 2 items

Displayed results

Platform "Forescout eyeControl"

Implement policy-based controls and automate! Respond quickly to incidents.

"Forescout eyeControl" is a platform that proactively reduces the attack surface by implementing and automating policy-based controls, allowing for rapid response to incidents. Security teams can prioritize, implement, and automate policy-based controls effectively. Additionally, organizations can improve their security hygiene, reduce their attack surface, and accelerate response and remediation to quickly mitigate threats, security incidents, and compliance gaps. 【Features】 ■ Protects sensitive data from external threats ■ Prevents the spread of malware from infected, vulnerable, and non-compliant devices ■ Prevents data theft and network downtime caused by targeted attacks ■ Supports network access and availability for employees, contractors, and customers ■ Ensures compliance with internal policies and external regulations, etc. *For more details, please download the PDF or contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IPScan NAC

Compliance measures, security threat measures, internal fraud measures!

We would like to introduce 'IPScan NAC', handled by Viascope Inc. It provides centralized management from controlling LAN-connected devices through both agent and agentless integration, to collecting connection information and performing device integrity checks. Additionally, we also offer "IPScan XE," an internal connection device management solution that automatically detects and visualizes various devices such as PCs, tablets, and smartphones connected to the network. 【Features】 ■ Real-time visualization of various devices from the administrator's operational perspective via a web management interface ■ Enhanced internal security support through a three-stage authentication process ■ Checks the launch and installation status of software on computers ■ Regularly verifies the integrity of computers and checks compliance adherence and violations ■ Controls bypass communications such as unauthorized tethering that are not part of the business LAN ■ Improves safety concerning the usage environment of devices *For more details, please download the PDF or feel free to contact us.

  • Other Software
  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration