Nacview Network Access Control

Your Network - Your Rules

NACVIEW is a Network Access Control solution.

It allows to control endpoints and identities that try to access the network - wired and wireless, including VPN connections. Thanks to the combination of NAC and extensive monitoring functionality, NACVIEW is an essential element for the proper and complete protection of the company's IT network.

We are a Polish software development company that started in 2012. Soon after, we started the NACVIEW project which became our main product. From the beginning we have had one goal: to increase the security of companies and institutions by providing them with the ability to control access to the network.

Discover The Nacview Apps

NACVIEW Scout

Collect data about endpoints with NACVIEW Scout. The program retrieves information about the device and shows its security status. Integrated with the NACVIEW system, it allows you to control the access of devices depending on having an up-to-date antivirus program or other elements essential for network security.

NACVIEW Assistant

Enable users to automatically configure network settings on the device. The NACVIEW Assistant is an automated network configurator adapted to the operating system of the device. This saves you time manually configuring network settings on each user's devices.

NACVIEW Authenticator

Ensure that your network is appropriately protected by two-factor authentication. The NACVIEW Authenticator is installed on the user's device to generate a unique code for it, allowing for additional verification. Thanks to this, you can be sure that the network will not be accessed by unwanted users who are a potential threat to the security of the entire network and the company.

Nacview Network Access Control

Your Network – Your Rules

NACVIEW is a Network Access Control solution.

It allows to control endpoints and identities that try to access the network – wired and wireless, including VPN connections. Thanks to the combination of NAC and extensive monitoring functionality, NACVIEW is an essential element for the proper and complete protection of the company’s IT network.

We are a Polish software development company that started in 2012. Soon after, we started the NACVIEW project which became our main product. From the beginning we have had one goal: to increase the security of companies and institutions by providing them with the ability to control access to the network.

Discover The Nacview Apps

NACVIEW Scout

Collect data about endpoints with NACVIEW Scout. The program retrieves information about the device and shows its security status. Integrated with the NACVIEW system, it allows you to control the access of devices depending on having an up-to-date antivirus program or other elements essential for network security.

NACVIEW Assistant

Enable users to automatically configure network settings on the device. The NACVIEW Assistant is an automated network configurator adapted to the operating system of the device. This saves you time manually configuring network settings on each user’s devices.

NACVIEW Authenticator

Ensure that your network is appropriately protected by two-factor authentication. The NACVIEW Authenticator is installed on the user’s device to generate a unique code for it, allowing for additional verification. Thanks to this, you can be sure that the network will not be accessed by unwanted users who are a potential threat to the security of the entire network and the company.

The Most Comprehensive Network Access Control Solution Available

NACVIEW system allows to control endpoints and identities that try to access the network – both wired and wireless, including VPN connections. Thanks to the combination of NAC and extensive monitoring functionality, NACVIEW is an essential element for the proper and complete protection of the company’s IT network.

NAC – 100% control

The NAC (Network Access Control) system allows to manage the access of users and their devices to the corporate network. Precisely, it is the possibility of detailed control over:

  • WHO? Who can access the network?
  • WHAT? What device can connect to the network?
  • HOW? On which network devices?
  • WHEN AND WHERE? Under which conditions?

VIEW – 100% visibility

NACVIEW detects connected to the network devices in real time: both end devices and network devices with which they connect. The system has the ability to download data on end devices from external databases such as Active Directory, SQL databases, LDAP or Radius servers. Using SNMP protocols, it is possible to turn on monitoring, which allows to view the operation of devices and their load.

802.1X

A standard that provides recommendations for authenticating devices on a network. Currently, it is recognized by specialists as the most effective method of preventing unauthorized access, which significantly increases the security of the entire network.

VLAN

A technology that allows you to create multiple virtual networks on one physical network. It is a logical grouping of devices and users, e.g. based on department or job title. These groups can be created regardless of where the users are physically located.

Captive Portal

PWebsite for the authorization of users who try to access the network. Through Captive Portal users will get to the Internet, but they will be able to use only resources specified by the administrator. There are two options in NACVIEW: configure an external Captive Portal (on network devices) or use the internal Captive Portal of the NACVIEW system.

Connection map

Automated and transparent visualization of device connections in the network. It provides a graphical representation of the network that allows to monitor which devices are connected and which are not. This allows to quickly detect network anomalies and react to them accordingly.

IPAM

IP address management, which will allow you to check the use of IP addresses, and to verify who or what device connects to a given address. This will also allow, among other things, to detect and prevent network collisions.

Threat detection

A feature that can detect incompatible, unknown or misconfigured devices. It will allow you to you to quickly find invalid network traffic (e.g. MAC / IP address cloning, port scanning, invalid gateway) and quarantine the infected device.

Solution integration

A feature that enables two-way information exchange between NACVIEW and other cybersecurity solutions. It increases the level of security by automatically responding to threats, e.g. disconnecting the device when malware is detected on it. Most often, integration concerns systems such as Firewall, UTM, MDM, SIEM, etc.

Profiling

Identification of devices connected to the network and their classification by device type (e.g. computer, telephone, printer, camera, etc.), type of operating system and manufacturer. Profiling uses many available methods, including: DHCP Fingerprinting, HTTP / S, NMAP, DNS, RADIUS.

BYOD and guest access

A solution that allows us to securely grant external users (guests) access to the network and register private devices of employees in the corporate network. Guest access can be allocated through fixed-term accounts or a dedicated portal.

檔案類型檔案名稱下載分享
產品資料Solution-Overview NACVIEW ENG (PDF)
產品資料Manager NACVIEW ENG (PDF)

日期

標題