Network Access
Control
Absolute flexibility & agility
Determine who has access to your corporate network and enforce compliance policies. Whether employee, guest, office or mobile, wired or wireless – NAC provides secure access and full control.
With the ever-growing number of accesses to your network, effective control is becoming increasingly complex. This poses a challenge, as the large number of devices and users requires comprehensive monitoring and security measures.
Basic Network Access Control module
With NAC solutions, you have a real-time view of your network and know which devices are currently connected to the network. You gain full transparency and protect your network from unauthorized devices by only allowing known devices access to productive network resources. The basic module is supplemented with comprehensive reporting functionalities.
Simple operation
“The user interface of the USP Network Authentication System® is intuitive to use, independent and also suitable for hybrid network infrastructures.”
Nicolas Perenoud, NAC Consultant
United Security Providers AG
HIGHLIGHTS
Independence
Our NAC solution is independent and is also suitable for hybrid network infrastructures.
Agentless
With our NAC solution, no software installation is necessary on the end devices.
Implementation
Our network security specialists have extensive implementation experience in NAC projects with up to 50,000 end devices.
swiss made software
Developed 100% in Switzerland – with the highest quality guarantee.
Plug-n-Play
Quick commissioning with just a few clicks and simple operation.
Mobile working
Thanks to USP NAS, you can also connect mobile devices to your network without any worries.
Simple operation
The user interface of the USP Network Authentication System® is intuitive to use and is available to users in German and English.
Reporting
You can easily operate the USP Network Authentication System® reporting via a browser. Create individual reports for all your needs. With a search function, filter options according to various parameters, scheduled reports and much more.
Role-based system
Seven different roles provide each user with easy access to the functions they need and enable a sensible distribution of responsibilities, competencies and tasks.