SlideShare a Scribd company logo
Maximize network security and IT operational efficiency powered by Device Platform Intelligence
REAL-TIM
E
CONTEXT-BASED
NETWORK CONTROL
Device,User
IP/MAC, Switch Port, SSID, Desktop Configuration
PolicyCom
pliance
VENDOR-AGNOSTIC
DEVICE
PLATFORM
INTELLIGENCE
ACCESS
Sees every connected device holistically
Controls all connected devices contextually
•	 Identifies all network-enabled devices and their attributes
•	 Views from all perspectives (Device, IP, Switch, WLAN)
•	 Assesses the compliance state of all connected devices
•	 Layer 2 based sensing technology for accurate detection of device platform
- Not just “Android phone” but “Samsung Galaxy S6 mobile phone”
•	 Manages the entire lifecycle of all IP-enabled devices
- Device Platform Identify
- Device Platform Context
- Device Platform Risk
•	 Expands visibility into IT/OT convergence
- IoT, ICS, FAB, SCADA
•	 Enforces granular policies to regulate access
•	 Controls endpoints’ systems configuration and network access
•	 Tracks endpoint activities and maintain IT security baseline
MobileAccess Point
IoT
Switch
PC
IDENTI
TY C
ONTEXT
RISK
DPI
Genian NAC helps maintain smart visibility & control of all network-enabled devices and
ensures they are operating at the highest level of security and compliance
Next-Gen Network Access Control for the IoT era
Automates daily IT security tasks easily
•	 Automates on-boarding process with workflows, approvals, notifications
•	 Removes IT security silos by integrating with third-party solutions
•	 Automates the incident response and mitigation process
Genians Device Platform Intelligence (DPI), which provides Next-generation
device fingerprinting for the IoT era, combines technology information with
business context to understand where vulnerabilities may exist. This demands
not only a more comprehensive view of the devices themselves but also better
understanding of risk indicators.
More than just device fingerprinting
Sees all connected “things” and their compliance status
NETWORK SURVEILLANCE
•	 Contextual access information (What, Who, When, Where, and How)
•	 Network Information (State, Trend, Anomaly) via Network Sensor
•	 Endpoint configuration and compliance status via Agent (e.g. Windows Updates)
Manages IP/MAC in real time
IP ADDRESS MANAGEMENT
•	 Identifies the usage of all IP addresses for each network segment
•	 Manages IP addresses (Allow, Deny, Lease, Assign) and MAC addresses (Whitelist/Blacklist)
•	 Prevents IP conflicts and manages IP ownership
IP
Responds immediately
NETWORK ACCESS CONTROL
•	 Condition-based grouping (Over 500 predefined conditions)
•	 Policy assignment based on the status change of endpoint compliance
•	 End-to-end access control inside of LAN
Identifies who accesses your network
USER AUTHENTICATION
•	 Captive Web Portal (Pre/Post-admission activities)
•	 Built-in RADIUS server
•	 Integration with external user databases (e.g. AD, Oracle, MySQL, CSV, G-Suite, MS 365)
Secures where it connects
SWITCH PORT MANAGEMENT
•	 Sees how many devices are connected to specific port and their connection status
•	 Monitors Switch port status (e.g. Up/down, Security, 802.1x, VLAN)
•	 Controls any ports connected to non-compliant devices
Automates your day-to-day IT operations easily
IT SECURITY AUTOMATION
•	 On-boarding Process (BYOD, Guest, IP provisioning, Peripheral Device Usage)
•	 Access Approval Request (Security & Privacy Consent, User/Device Registration, IP Request)
•	 System Integration (via RESTful API, Webhook, Syslog)
Ensures the highest levels of security and compliance
DESKTOP MANAGEMENT
•	 Desktop Configuration Management (e.g. Security Settings, Internet Options, NIC, DNS)
•	 OS Updates Management (Windows, macOS)
•	 Application Management (Deploy, Update, Delete)
•	 External Device Control (e.g. USB Thumb-drive, CD-ROM, External-HDD)
Controls Wifi Security and Wireless Access
WLAN MANAGEMENT
•	 Monitors all SSIDs in your network and identifies who connects to which SSIDs
•	 Discovers rogue and mis-configured wireless APs
•	 Discovers the device locations via Network Sensor or Agent
•	 Built-in RADIUS Server (EAP Support)
You Choose, We Deliver!
Genians can provide both on-premise and cloud-based deployment options. It also provides a more dedicated
solution for MSP and MSSP businesses, which can secure multi-tenancy environments more effectively and deliver
cloud-based management service packages for ease of deployment and ongoing management.
On-Premises
Get the software for your business needs
Cloud-Managed
Run your Policy Server in the cloud
CSP-Ready
Build your own NAC-as-a-Service
In Genians We Trust
North America
50 High Street, Suite 45
North Andover, MA, 01845
United States of America
hello@genians.com
+1-617-307-4090
East Asia
ACE Pyeongchon Tower, 8th floor
361 Simindaero, Dongan-gu Anyang-si
Gyeonggi-do, South Korea
geni@genians.com
+82-31-422-3823
Genians (KOSDAQ: 263860) reimagines Network Access Control by using Device Platform Intelligence to monitor the entire lifecycle of all
network-connected devices to ensure the highest levels of IT security, availability, resilience, and agility. Genians is working to build a better
security culture in the connected world by teaming up with global communities and industry leaders around the world.
TOGETHER, MORE SECURE.
Over the last 13 years, Genians has supported more than 1,100 customers around the world and secured
millions of endpoint connections in organizations of all sizes and industries, including global Fortune 500
companies, the government, the military, energy, finance, healthcare, education, and beyond.
Genians Named a Representative Vendor in
Gartner 2018 Market Guide for Network Access Control
“Thanks to Genians’ non-disruptive sensing technology powered by its Device Platform Intelligence, we can see what,
who, when, where, and how is connected to our network. It’s ‘Crystal Clear’! This real-time visibility enables us to manage
and enforce various types of endpoint devices more precisely and just in time. Yes, we are ready for the IoT era!”

More Related Content

Genian NAC Overview

  • 1. Maximize network security and IT operational efficiency powered by Device Platform Intelligence REAL-TIM E CONTEXT-BASED NETWORK CONTROL Device,User IP/MAC, Switch Port, SSID, Desktop Configuration PolicyCom pliance VENDOR-AGNOSTIC DEVICE PLATFORM INTELLIGENCE ACCESS Sees every connected device holistically Controls all connected devices contextually • Identifies all network-enabled devices and their attributes • Views from all perspectives (Device, IP, Switch, WLAN) • Assesses the compliance state of all connected devices • Layer 2 based sensing technology for accurate detection of device platform - Not just “Android phone” but “Samsung Galaxy S6 mobile phone” • Manages the entire lifecycle of all IP-enabled devices - Device Platform Identify - Device Platform Context - Device Platform Risk • Expands visibility into IT/OT convergence - IoT, ICS, FAB, SCADA • Enforces granular policies to regulate access • Controls endpoints’ systems configuration and network access • Tracks endpoint activities and maintain IT security baseline MobileAccess Point IoT Switch PC IDENTI TY C ONTEXT RISK DPI Genian NAC helps maintain smart visibility & control of all network-enabled devices and ensures they are operating at the highest level of security and compliance Next-Gen Network Access Control for the IoT era Automates daily IT security tasks easily • Automates on-boarding process with workflows, approvals, notifications • Removes IT security silos by integrating with third-party solutions • Automates the incident response and mitigation process Genians Device Platform Intelligence (DPI), which provides Next-generation device fingerprinting for the IoT era, combines technology information with business context to understand where vulnerabilities may exist. This demands not only a more comprehensive view of the devices themselves but also better understanding of risk indicators. More than just device fingerprinting
  • 2. Sees all connected “things” and their compliance status NETWORK SURVEILLANCE • Contextual access information (What, Who, When, Where, and How) • Network Information (State, Trend, Anomaly) via Network Sensor • Endpoint configuration and compliance status via Agent (e.g. Windows Updates) Manages IP/MAC in real time IP ADDRESS MANAGEMENT • Identifies the usage of all IP addresses for each network segment • Manages IP addresses (Allow, Deny, Lease, Assign) and MAC addresses (Whitelist/Blacklist) • Prevents IP conflicts and manages IP ownership IP Responds immediately NETWORK ACCESS CONTROL • Condition-based grouping (Over 500 predefined conditions) • Policy assignment based on the status change of endpoint compliance • End-to-end access control inside of LAN Identifies who accesses your network USER AUTHENTICATION • Captive Web Portal (Pre/Post-admission activities) • Built-in RADIUS server • Integration with external user databases (e.g. AD, Oracle, MySQL, CSV, G-Suite, MS 365) Secures where it connects SWITCH PORT MANAGEMENT • Sees how many devices are connected to specific port and their connection status • Monitors Switch port status (e.g. Up/down, Security, 802.1x, VLAN) • Controls any ports connected to non-compliant devices
  • 3. Automates your day-to-day IT operations easily IT SECURITY AUTOMATION • On-boarding Process (BYOD, Guest, IP provisioning, Peripheral Device Usage) • Access Approval Request (Security & Privacy Consent, User/Device Registration, IP Request) • System Integration (via RESTful API, Webhook, Syslog) Ensures the highest levels of security and compliance DESKTOP MANAGEMENT • Desktop Configuration Management (e.g. Security Settings, Internet Options, NIC, DNS) • OS Updates Management (Windows, macOS) • Application Management (Deploy, Update, Delete) • External Device Control (e.g. USB Thumb-drive, CD-ROM, External-HDD) Controls Wifi Security and Wireless Access WLAN MANAGEMENT • Monitors all SSIDs in your network and identifies who connects to which SSIDs • Discovers rogue and mis-configured wireless APs • Discovers the device locations via Network Sensor or Agent • Built-in RADIUS Server (EAP Support) You Choose, We Deliver! Genians can provide both on-premise and cloud-based deployment options. It also provides a more dedicated solution for MSP and MSSP businesses, which can secure multi-tenancy environments more effectively and deliver cloud-based management service packages for ease of deployment and ongoing management. On-Premises Get the software for your business needs Cloud-Managed Run your Policy Server in the cloud CSP-Ready Build your own NAC-as-a-Service
  • 4. In Genians We Trust North America 50 High Street, Suite 45 North Andover, MA, 01845 United States of America hello@genians.com +1-617-307-4090 East Asia ACE Pyeongchon Tower, 8th floor 361 Simindaero, Dongan-gu Anyang-si Gyeonggi-do, South Korea geni@genians.com +82-31-422-3823 Genians (KOSDAQ: 263860) reimagines Network Access Control by using Device Platform Intelligence to monitor the entire lifecycle of all network-connected devices to ensure the highest levels of IT security, availability, resilience, and agility. Genians is working to build a better security culture in the connected world by teaming up with global communities and industry leaders around the world. TOGETHER, MORE SECURE. Over the last 13 years, Genians has supported more than 1,100 customers around the world and secured millions of endpoint connections in organizations of all sizes and industries, including global Fortune 500 companies, the government, the military, energy, finance, healthcare, education, and beyond. Genians Named a Representative Vendor in Gartner 2018 Market Guide for Network Access Control “Thanks to Genians’ non-disruptive sensing technology powered by its Device Platform Intelligence, we can see what, who, when, where, and how is connected to our network. It’s ‘Crystal Clear’! This real-time visibility enables us to manage and enforce various types of endpoint devices more precisely and just in time. Yes, we are ready for the IoT era!”