SlideShare a Scribd company logo
2
Most read
ARCHITECTURE
Genians has reimagined Network Access Control
to maximize network security and IT operational
effectiveness by leveraging its distinct Device
Platform Intelligence (DPI).
Provides extremely accurate IT asset identifica-
tion/classification based on its robust DPI, which
allows for the full interrogation and gathering
of all device platform information, combining
technology-specific with business-contextual and
risk-level data.
Device Platform Identity
•	The name of Device Platform consists of man-
ufacturer, device name, model number
•	The actual picture of the device platforms
•	The list of device fingerprinting sources
•	Network connection type (Wired, Wireless)
•	Released Date
Device Platform Context
•	Product end of life (EOL)
•	Product end of support (EOS)
•	Manufacturer business status
•	Manufacturer location (Country)
•	Manufacturer homepage
Device Platform Risk
•	Common Vulnerabilities and Exposures (CVE)
•	Report manufacturer/vendor going out of
business or being acquired, which can intro-
duce systems that cannot be upgraded or
patched
Delivers all-in-one solutions that encompass both
IT security and operations management very
effectively.
•	Network Surveillance
•	Network Access Control
•	Mobile, BYOD, Guest Management
•	IP Address Management (IPAM)
•	Switch Port Management
•	WLAN Security
•	Endpoint Security
•	IT Security Automation
Integrates a wide range of IT security and business
solutions (Firewall, IDS/IPS, VM, MDM, SIEM, APT,
DLP, CMDB etc.) into each enterprise’s Policy Serv-
er to ensure unified policy enforcement. Genian
NAC supports custom integration using Syslog,
Webhook, REST API, and Syslog.
Monitors your network through personalized
dashboards (Over 100 custom widgets to meet
your network management needs).
Performs compliance checks in real-time to
ensure that all connected devices are automati-
cally identified, classified, authorized, and given
policy-based access control to ensure the highest
levels of IT security, availability, and resilience.
BASIC
Network Surveillance
PROFESSIONAL
Network Access Control
ENTERPRISE
Automation
On-Premises
Free up to
300 devices*
30 days
free trial
Contact
a Genians Partner
Cloud-Managed
Policy Server in the Cloud
30 days free trial
Support up to 3,000 devices*
CSP-Ready
NAC as a service
Contact Genians
Choose the edition that best meets your business requirements. Upgrade between
editions as your network evolves without losing your original investment.
The editions can be delivered in 3 different ways:
Policy Server
Agent
IDENTI
TY C
ONTEXT
RISK
DPI
•	 Validate device platform information via the cloud
•	 Delivers the most accurate up-to-date device platform
information to Policy Servers on a weekly basis
•	 Scans and assesses networks (Wired, Wireless, Virtual)
•	 Detects all SSIDs by listening wifi signals
•	 Identifies who is accessing enterprise-owned, neighbor or rogue APs
•	 Enforces access control policies
•	 Supports 802.1q Trunk Port
•	 Manages installed HW/SW information
•	 Detects state changes in real time
•	 Performs incremental updates
•	 Controls all desktop configurations
•	 Provides Wireless Connection Manager (EAP-GTC)
•	 Supports Windows/macOS /Linux
•	 Lightweight Agent
•	 Establishes security policies based on Node information collected by
Network Sensors and Agents
•	 Distributes established policies to Network Sensors and Agents
•	 Integrates with user database and third-party security solutions
•	 Includes Built-in DHCP, RADIUS, Syslog server
* Can be hosted On-Prem or in the Cloud
* Optional
Genian NAC uses Layer 2 based non-disruptive sensing technology powered by its
Device Platform Intelligence.
EDITIONS & VERSIONS
* Only count the number of active devices
Next-Gen Network Access Control for the IoT era
You can install the Policy Server and Network Sensor software in either your Virtual
or Physical machines (Intel Xeon or equivalent).
Completely out-of-band, Highly scalable
You Choose, We Deliver
DATASHEET
FEATURES
Network Surveillance
Desktop Configuration Management*
•	 Change Computer Name
•	 Check Password Validation
•	 Collect System Information Using WMI
•	 Configure Windows Security Settings
•	 Control OS Updates (Works for isolated network)
•	 Configuring 802.1X Wired Authentication Profile Settings
•	 Control Antivirus Software Settings
•	 Control DNS
•	 Control External Device (e.g. USB, Printer)
•	 Control Internet Explorer Security Settings
•	 Control Network Folder Sharing / Interface / Traffic
•	 Control Power Options, Screen Lock
•	 Provide Wireless Connection Manager (Zero configuration)
•	 Control WLAN
•	 Deploy Files
•	 Inspect TCP Connections
•	 Manage ARP Table
•	 Install / Remove softwares
•	 Run Script
•	 Terminate Process
Network Access Control
IP Address Management Policy
•	 Trusted IP/MAC lifetime management
•	 Block IP changes, Prevent IP conflicts
Classification & Enforcement Policy
•	 Node Group: Dynamic Group using over 500 Conditions
•	 Define network access rule per each node group  
(Node group + Permissions)
•	 Permissions: Network range, Services, Time
Multi-layered Enforcement Method
•	 Layer 2: ARP Poisoning (Network Sensor)
•	 Layer 3: TCP reset (Mirror Sensor)
•	 Layer 3: Inline enforcer (Dual-homed Gateway)
•	 Endpoint: Agent-based control
•	 802.1x: Built-in RADIUS server
•	 DHCP: Built-in DHCP server
•	 Switch: Port shutdown (SNMP)
Network
•	 MAC/IP (IPv4 / IPv6)
•	 Hostname / Domain
•	 DNS Name
•	 NIC Vendor
•	 SSID
•	 Connection Type
•	 Switch Port
•	 Traffics
•	 TCP Connections
•	 Services
•	 Open Port
Anomaly
•	 ARP spoofing
•	 ARP bombing
•	 MAC/IP cloning
•	 Invalid Gateway
•	 Ad Hoc Network
•	 Port Scan
•	 Unknown Service Request
Security*
•	 Compliance status
•	 OS Patches and Updates
•	 Antivirus
•	 Firewall
•	 Screen Lock
•	 Password Check
•	 Logs
Hardware Installed*
•	 Motherboard
•	 CPU
•	 Memory
•	 Hard drives / Storage size
•	 NIC (Wired, Wireless)
•	 Operating System
Peripherals*
•	 USB Devices
•	 Monitor, Printer
Operating System*
•	 Type
•	 Version
•	 Languages
•	 Sharing folders
•	 Web browser
•	 WMI status
Software installed*
•	 Name
•	 Version
•	 Installed date
•	 Installed path
•	 Detected date
•	 Removed date
Device Information
•	 Device name
•	 Platform name
•	 Node Type
•	 Connection status
•	 Authentication status
•	 NAT Device
Device Lifecycle
•	 Actual device image
•	 Manufacturer name
•	 Manufacturer Headquarters
•	 Manufacturer Business Status
•	 Common Vulnerabilities and
Exposures (CVE)
•	 End of Sales / Support
User
•	 Username
•	 Account info
•	 Contact info
•	 RADIUS Authentication
* Agent required
North America
50 High Street, Suite 45
North Andover, MA, 01845
United States of America
hello@genians.com
+1-617-307-4090
East Asia
ACE Pyeongchon Tower, 8th floor
361 Simindaero, Dongan-gu Anyang-si
Gyeonggi-do, South Korea
geni@genians.com
+82-31-422-3823
Over 1,100 happy customers around the world trust Genian NAC Solution to maximize their network security and IT operational efficiencies
TOGETHER, MORE SECURE.
Encompass IT Security Management and Operation

More Related Content

PPTX
Testing a service
Johan Hoberg
 
PPTX
Secure lab setup for cyber security
Birju Tank
 
PPTX
Human Computer Interaction Chapter 3 HCI in the Software Process and Design ...
VijiPriya Jeyamani
 
PPTX
Ch20-Software Engineering 9
Ian Sommerville
 
PDF
Software Engineering - Ch8
Siddharth Ayer
 
PPTX
Software Quality assurance.pptx
KarthigaiSelviS3
 
PDF
Lecture 4: Human-Computer Interaction: Prototyping (2014)
Lora Aroyo
 
PDF
Platform Technology (2).pdf
FranzLawrenzDeTorres1
 
Testing a service
Johan Hoberg
 
Secure lab setup for cyber security
Birju Tank
 
Human Computer Interaction Chapter 3 HCI in the Software Process and Design ...
VijiPriya Jeyamani
 
Ch20-Software Engineering 9
Ian Sommerville
 
Software Engineering - Ch8
Siddharth Ayer
 
Software Quality assurance.pptx
KarthigaiSelviS3
 
Lecture 4: Human-Computer Interaction: Prototyping (2014)
Lora Aroyo
 
Platform Technology (2).pdf
FranzLawrenzDeTorres1
 

Similar to Genian NAC Datasheet (20)

PDF
Genian NAC Overview
GENIANS, INC.
 
PPT
Uac sales pres_20_apr09-2
lousifers
 
PDF
BOSNOG NAC stack 2018
GENIANS, INC.
 
PPTX
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Nextel S.A.
 
PPTX
ISE_2.1_BDM_v3a.pptx
Yaser330700
 
PPTX
Network Control Access for Non-IT Professionals
Incheon Park
 
PDF
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Grant Swanson
 
PPTX
Cisco Identity Services Engine (ISE)
Anwesh Dixit
 
PDF
Is Your Network Ready for the Age of IoT?
GENIANS, INC.
 
PDF
What we learned from MISA Ontario 2020 Infosec
GENIANS, INC.
 
PPTX
OwnYIT CSAT + SIEM
NCS Computech Ltd.
 
PDF
Throughwave Day 2015 - ForeScout Automated Security Control
Aruj Thirawat
 
PDF
A modern approach to safeguarding your ICS and SCADA systems
Alane Moran
 
PPTX
Windows 7 And Windows Server 2008 R2 Combined Value
Amit Gatenyo
 
PDF
Cyberoam-Techsheet
Baqar Kazmi
 
PPTX
Identify and mitigate high risk port vulnerabilities
GENIANS, INC.
 
PPTX
Sem cis ise
Lino Quivén
 
PDF
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks
 
PDF
Fore scout nac-datasheet
Khoa Nguyen Hong Nguyen
 
PDF
Cisco ISE,Eve ng online lab Services.pdf
ServerTours
 
Genian NAC Overview
GENIANS, INC.
 
Uac sales pres_20_apr09-2
lousifers
 
BOSNOG NAC stack 2018
GENIANS, INC.
 
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Nextel S.A.
 
ISE_2.1_BDM_v3a.pptx
Yaser330700
 
Network Control Access for Non-IT Professionals
Incheon Park
 
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Grant Swanson
 
Cisco Identity Services Engine (ISE)
Anwesh Dixit
 
Is Your Network Ready for the Age of IoT?
GENIANS, INC.
 
What we learned from MISA Ontario 2020 Infosec
GENIANS, INC.
 
OwnYIT CSAT + SIEM
NCS Computech Ltd.
 
Throughwave Day 2015 - ForeScout Automated Security Control
Aruj Thirawat
 
A modern approach to safeguarding your ICS and SCADA systems
Alane Moran
 
Windows 7 And Windows Server 2008 R2 Combined Value
Amit Gatenyo
 
Cyberoam-Techsheet
Baqar Kazmi
 
Identify and mitigate high risk port vulnerabilities
GENIANS, INC.
 
Sem cis ise
Lino Quivén
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks
 
Fore scout nac-datasheet
Khoa Nguyen Hong Nguyen
 
Cisco ISE,Eve ng online lab Services.pdf
ServerTours
 
Ad

Recently uploaded (20)

PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
Doc9.....................................
SofiaCollazos
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Doc9.....................................
SofiaCollazos
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
REPORT: Heating appliances market in Poland 2024
SPIUG
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
The Future of Artificial Intelligence (AI)
Mukul
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Ad

Genian NAC Datasheet

  • 1. ARCHITECTURE Genians has reimagined Network Access Control to maximize network security and IT operational effectiveness by leveraging its distinct Device Platform Intelligence (DPI). Provides extremely accurate IT asset identifica- tion/classification based on its robust DPI, which allows for the full interrogation and gathering of all device platform information, combining technology-specific with business-contextual and risk-level data. Device Platform Identity • The name of Device Platform consists of man- ufacturer, device name, model number • The actual picture of the device platforms • The list of device fingerprinting sources • Network connection type (Wired, Wireless) • Released Date Device Platform Context • Product end of life (EOL) • Product end of support (EOS) • Manufacturer business status • Manufacturer location (Country) • Manufacturer homepage Device Platform Risk • Common Vulnerabilities and Exposures (CVE) • Report manufacturer/vendor going out of business or being acquired, which can intro- duce systems that cannot be upgraded or patched Delivers all-in-one solutions that encompass both IT security and operations management very effectively. • Network Surveillance • Network Access Control • Mobile, BYOD, Guest Management • IP Address Management (IPAM) • Switch Port Management • WLAN Security • Endpoint Security • IT Security Automation Integrates a wide range of IT security and business solutions (Firewall, IDS/IPS, VM, MDM, SIEM, APT, DLP, CMDB etc.) into each enterprise’s Policy Serv- er to ensure unified policy enforcement. Genian NAC supports custom integration using Syslog, Webhook, REST API, and Syslog. Monitors your network through personalized dashboards (Over 100 custom widgets to meet your network management needs). Performs compliance checks in real-time to ensure that all connected devices are automati- cally identified, classified, authorized, and given policy-based access control to ensure the highest levels of IT security, availability, and resilience. BASIC Network Surveillance PROFESSIONAL Network Access Control ENTERPRISE Automation On-Premises Free up to 300 devices* 30 days free trial Contact a Genians Partner Cloud-Managed Policy Server in the Cloud 30 days free trial Support up to 3,000 devices* CSP-Ready NAC as a service Contact Genians Choose the edition that best meets your business requirements. Upgrade between editions as your network evolves without losing your original investment. The editions can be delivered in 3 different ways: Policy Server Agent IDENTI TY C ONTEXT RISK DPI • Validate device platform information via the cloud • Delivers the most accurate up-to-date device platform information to Policy Servers on a weekly basis • Scans and assesses networks (Wired, Wireless, Virtual) • Detects all SSIDs by listening wifi signals • Identifies who is accessing enterprise-owned, neighbor or rogue APs • Enforces access control policies • Supports 802.1q Trunk Port • Manages installed HW/SW information • Detects state changes in real time • Performs incremental updates • Controls all desktop configurations • Provides Wireless Connection Manager (EAP-GTC) • Supports Windows/macOS /Linux • Lightweight Agent • Establishes security policies based on Node information collected by Network Sensors and Agents • Distributes established policies to Network Sensors and Agents • Integrates with user database and third-party security solutions • Includes Built-in DHCP, RADIUS, Syslog server * Can be hosted On-Prem or in the Cloud * Optional Genian NAC uses Layer 2 based non-disruptive sensing technology powered by its Device Platform Intelligence. EDITIONS & VERSIONS * Only count the number of active devices Next-Gen Network Access Control for the IoT era You can install the Policy Server and Network Sensor software in either your Virtual or Physical machines (Intel Xeon or equivalent). Completely out-of-band, Highly scalable You Choose, We Deliver DATASHEET
  • 2. FEATURES Network Surveillance Desktop Configuration Management* • Change Computer Name • Check Password Validation • Collect System Information Using WMI • Configure Windows Security Settings • Control OS Updates (Works for isolated network) • Configuring 802.1X Wired Authentication Profile Settings • Control Antivirus Software Settings • Control DNS • Control External Device (e.g. USB, Printer) • Control Internet Explorer Security Settings • Control Network Folder Sharing / Interface / Traffic • Control Power Options, Screen Lock • Provide Wireless Connection Manager (Zero configuration) • Control WLAN • Deploy Files • Inspect TCP Connections • Manage ARP Table • Install / Remove softwares • Run Script • Terminate Process Network Access Control IP Address Management Policy • Trusted IP/MAC lifetime management • Block IP changes, Prevent IP conflicts Classification & Enforcement Policy • Node Group: Dynamic Group using over 500 Conditions • Define network access rule per each node group   (Node group + Permissions) • Permissions: Network range, Services, Time Multi-layered Enforcement Method • Layer 2: ARP Poisoning (Network Sensor) • Layer 3: TCP reset (Mirror Sensor) • Layer 3: Inline enforcer (Dual-homed Gateway) • Endpoint: Agent-based control • 802.1x: Built-in RADIUS server • DHCP: Built-in DHCP server • Switch: Port shutdown (SNMP) Network • MAC/IP (IPv4 / IPv6) • Hostname / Domain • DNS Name • NIC Vendor • SSID • Connection Type • Switch Port • Traffics • TCP Connections • Services • Open Port Anomaly • ARP spoofing • ARP bombing • MAC/IP cloning • Invalid Gateway • Ad Hoc Network • Port Scan • Unknown Service Request Security* • Compliance status • OS Patches and Updates • Antivirus • Firewall • Screen Lock • Password Check • Logs Hardware Installed* • Motherboard • CPU • Memory • Hard drives / Storage size • NIC (Wired, Wireless) • Operating System Peripherals* • USB Devices • Monitor, Printer Operating System* • Type • Version • Languages • Sharing folders • Web browser • WMI status Software installed* • Name • Version • Installed date • Installed path • Detected date • Removed date Device Information • Device name • Platform name • Node Type • Connection status • Authentication status • NAT Device Device Lifecycle • Actual device image • Manufacturer name • Manufacturer Headquarters • Manufacturer Business Status • Common Vulnerabilities and Exposures (CVE) • End of Sales / Support User • Username • Account info • Contact info • RADIUS Authentication * Agent required North America 50 High Street, Suite 45 North Andover, MA, 01845 United States of America [email protected] +1-617-307-4090 East Asia ACE Pyeongchon Tower, 8th floor 361 Simindaero, Dongan-gu Anyang-si Gyeonggi-do, South Korea [email protected] +82-31-422-3823 Over 1,100 happy customers around the world trust Genian NAC Solution to maximize their network security and IT operational efficiencies TOGETHER, MORE SECURE. Encompass IT Security Management and Operation