All IT Managers and network operators face a common challenge: how to maintain an effective cybersecurity defense profile while supporting business productivity in the face of ever-evolving and increasingly complex networks (from wired and wireless to multi-cloud environments) and also various access demands (from BYOD, to Guest, and, of course, the Internet of Things.
Assembling the right set of tools and processes to address this challenge is likewise a complex matter. The security marketplace is awash in tools and security solutions from which to choose, some single-purpose, some fully-fledged platforms. Many of these either do not work together seamlessly or require considerable time, effort, and expertise to integrate.
The shortage of sufficiently knowledgeable professionals in today’s market contributes further to the challenge, and requires IT departments to “train up” and maximize their existing pool of human resources.
Finally, conducting POC’s to determine which solution or combination of solutions is best-suited to a particular organization is both time-consuming and resource intensive. Doing so requires a significant level of investment and commitment.
All in all, establishing and maintaining an effective security defense profile is a daunting task. How does one get started?
What do I need to do first?
No matter what, you need to discover the full extent of the devices and connections that exist across your network environment, learn who is accessing it, as well as when and how, yet without disturbing your existing IT network infrastructure.
Genians’ flagship solution, Genian NAC, is a Sensor-based NAC solution that provides all of this information without requiring any changes to your Switch infrastructure. It is literally a “plug and play” product. This makes it easy to deploy – a happy thing for both Network and Security Administrators alike.
Once Genian NAC’s Network Sensor is plugged into your network, you can monitor your network in real-time, effectively like a surveillance camera.
Genian NAC presents your network status from 4 major perspectives: Device, IP address, Switch, and WLAN.
You can even monitor your network through personalized dashboards (NAC maintains over 100 custom widgets to meet your network management needs).
Now, review what you discovered through Genian NAC and compare that to your IT security baseline profile.
You need NAC at the forefront of your cybersecurity architecture. Genian NAC can orchestrate all IT resources by integrating with other security solutions through Restful/SOAP API and exchange/share data automatically to identify and mitigate any security risks.
You need more than network monitoring and device fingerprinting information
Genian NAC provides extremely accurate IT asset identification/classification (Device Platform Type, SW, HW, Services, Network Interfaces, User, Windows Updates, Anti-virus, etc.) based on its robust “Device Platform Intelligence” (which contains 20,000+ device profiling “signatures”)
Genian NAC offers the most accurate device fingerprinting database in a comprehensive manner (combining Technology + Business Context, such as EOL, EOS, and Manufacturer business status, along with the device status details noted above)
You need a comprehensive solution.
Genians delivers all-in-one solutions that encompass both IT security and operations management very effectively.
- Network Surveillance
- Network Access Control
- Mobile, BYOD, Guest Management
- IP Address Management
- Switch Port Management
- WLAN Security
- Endpoint Security
- IT Security Automation
You need to have dynamic access control in place to protect your evolving network and various access demands.
Genian NAC provides a multi-layered enforcement approach:
- Layer 2: ARP Poisoning (using Network Sensor)
- Layer 3: TCP reset (using Mirror Sensor)
- Layer 3: Inline enforcer (Dual-homed Gateway)
- Agent: NIC/Power Control, Alert Popup
- 802.1x: Built-in RADIUS server
- DHCP: Built-in DHCP server
- Integration: Firewall, Switch port shutdown (SNMP)
You need to automate IT security
Network access can be denied by Genian NAC to those devices not meeting the conditions established, and automated remediation initiated as appropriate to either bring the device into compliance or place it in quarantine automatically.
Automated environment security management: eg Self-Service Portal for BYOD access provisioning, Guest management.
Full visibility, control, and compliance assurance translates into full, on-demand, real-time reporting.
You need to support your evolving network environments.
A leader in cyber defense innovation, Genians is the number 1 NAC solution provider over the last 15 years in its home market.
- Genians was founded in 2005 with its headquarters in South Korea.
- Genian NAC holds over 45% of the NAC market share in South Korea. The company is listed on KOSDAQ (263860).
- Genians also has offices in Boston (US), Singapore, and Serbia.
- Genians Named a Representative Vendor in Gartner 2018 Market Guide for Network Access Control
- Over 1,600 customers including larger enterprises (Samsung, Hyundai, LG, Starbuck, eBay, BMW, and more.) the government, military, energy, finance, healthcare, education, and beyond.
Genian NAC provides 3 different editions; Basic (Visibility related features,) Professional (Control-related features), Enterprise (Customization, Integration, and advanced features). This phased approach will help you to experience Genian NAC with greater convenience and effectiveness in matching the right product edition to your particular network environment.
You can start testing Genian NAC immediately using your own devices.
Yeonju has worked in the cybersecurity business (NAC, E-DLP, Antivirus) for over 8 years, focusing on technical writing, sales engineering, and professional services in the global market. In her current position, she is responsible for promoting Genians NAC to the global market by collaborating with our business partners in the APAC/Middle East market.