InfoExpress, a leader in network access control solutions, announced Dynamic NAC Guest Enforcer
LAS VEGAS -- InfoExpress, a leader in network access control solutions, today announced Dynamic NAC Guest Enforcer. The new product ensures that organizations of all sizes are able to manage guest access to the network and identify and quarantine unauthorized users and rogues. Dynamic NAC Guest Enforcer is the only solution that can be deployed without any network changes, at the industry's most affordable price.
Dynamic NAC Guest Enforcer comes with the most popular features of InfoExpress' full Dynamic NAC Suite solution, simplified for guest access to the network. The Dynamic NAC Guest Enforcer edition focuses on authenticating guests and checking their computers before and after admission to the network. As part of a family of network access control products, Dynamic NAC Guest Enforcer can be easily upgraded to Dynamic NAC Suite to provide auditing and network access control for all devices on the network.
"Many of our enterprise customers have asked for an easier way to guard against rogue endpoints or non-compliant guests accessing their networks," said John Kasser, vice president Internet Security Services, Sayers, Inc. "We're excited about InfoExpress' Dynamic NAC Guest Enforcer because it is a network access control solution that installs rapidly, is very cost effective, and produces immediate benefits to our customers."
NAC solutions in the market today are expensive and hard to implement. With even small networks, NAC can take weeks to install and configure. The Dynamic NAC access control method eliminates the barriers to NAC deployment by requiring zero changes to the network. The unique approach requires no network reconfiguration, no network upgrades; just a straightforward software installation.
"Over the years NAC has developed a reputation for being expensive, hard to deploy and configuration intensive," said Stacey Lum, CEO of InfoExpress. "We are proud to offer the first NAC solution that addresses guest access, one of the key uses for NAC, that is not a major undertaking for the organization and at the lowest price point in the industry."
About the Author(s)
You May Also Like
The fuel in the new AI race: Data
April 23, 2024Securing Code in the Age of AI
April 24, 2024Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024