2
Most read
ARCHITECTURE
Genians has reimagined Network Access Control
to maximize network security and IT operational
effectiveness by leveraging its distinct Device
Platform Intelligence (DPI).
Provides extremely accurate IT asset identifica-
tion/classification based on its robust DPI, which
allows for the full interrogation and gathering
of all device platform information, combining
technology-specific with business-contextual and
risk-level data.
Device Platform Identity
•	The name of Device Platform consists of man-
ufacturer, device name, model number
•	The actual picture of the device platforms
•	The list of device fingerprinting sources
•	Network connection type (Wired, Wireless)
•	Released Date
Device Platform Context
•	Product end of life (EOL)
•	Product end of support (EOS)
•	Manufacturer business status
•	Manufacturer location (Country)
•	Manufacturer homepage
Device Platform Risk
•	Common Vulnerabilities and Exposures (CVE)
•	Report manufacturer/vendor going out of
business or being acquired, which can intro-
duce systems that cannot be upgraded or
patched
Delivers all-in-one solutions that encompass both
IT security and operations management very
effectively.
•	Network Surveillance
•	Network Access Control
•	Mobile, BYOD, Guest Management
•	IP Address Management (IPAM)
•	Switch Port Management
•	WLAN Security
•	Endpoint Security
•	IT Security Automation
Integrates a wide range of IT security and business
solutions (Firewall, IDS/IPS, VM, MDM, SIEM, APT,
DLP, CMDB etc.) into each enterprise’s Policy Serv-
er to ensure unified policy enforcement. Genian
NAC supports custom integration using Syslog,
Webhook, REST API, and Syslog.
Monitors your network through personalized
dashboards (Over 100 custom widgets to meet
your network management needs).
Performs compliance checks in real-time to
ensure that all connected devices are automati-
cally identified, classified, authorized, and given
policy-based access control to ensure the highest
levels of IT security, availability, and resilience.
BASIC
Network Surveillance
PROFESSIONAL
Network Access Control
ENTERPRISE
Automation
On-Premises
Free up to
300 devices*
30 days
free trial
Contact
a Genians Partner
Cloud-Managed
Policy Server in the Cloud
30 days free trial
Support up to 3,000 devices*
CSP-Ready
NAC as a service
Contact Genians
Choose the edition that best meets your business requirements. Upgrade between
editions as your network evolves without losing your original investment.
The editions can be delivered in 3 different ways:
Policy Server
Agent
IDENTI
TY C
ONTEXT
RISK
DPI
•	 Validate device platform information via the cloud
•	 Delivers the most accurate up-to-date device platform
information to Policy Servers on a weekly basis
•	 Scans and assesses networks (Wired, Wireless, Virtual)
•	 Detects all SSIDs by listening wifi signals
•	 Identifies who is accessing enterprise-owned, neighbor or rogue APs
•	 Enforces access control policies
•	 Supports 802.1q Trunk Port
•	 Manages installed HW/SW information
•	 Detects state changes in real time
•	 Performs incremental updates
•	 Controls all desktop configurations
•	 Provides Wireless Connection Manager (EAP-GTC)
•	 Supports Windows/macOS /Linux
•	 Lightweight Agent
•	 Establishes security policies based on Node information collected by
Network Sensors and Agents
•	 Distributes established policies to Network Sensors and Agents
•	 Integrates with user database and third-party security solutions
•	 Includes Built-in DHCP, RADIUS, Syslog server
* Can be hosted On-Prem or in the Cloud
* Optional
Genian NAC uses Layer 2 based non-disruptive sensing technology powered by its
Device Platform Intelligence.
EDITIONS & VERSIONS
* Only count the number of active devices
Next-Gen Network Access Control for the IoT era
You can install the Policy Server and Network Sensor software in either your Virtual
or Physical machines (Intel Xeon or equivalent).
Completely out-of-band, Highly scalable
You Choose, We Deliver
DATASHEET
FEATURES
Network Surveillance
Desktop Configuration Management*
•	 Change Computer Name
•	 Check Password Validation
•	 Collect System Information Using WMI
•	 Configure Windows Security Settings
•	 Control OS Updates (Works for isolated network)
•	 Configuring 802.1X Wired Authentication Profile Settings
•	 Control Antivirus Software Settings
•	 Control DNS
•	 Control External Device (e.g. USB, Printer)
•	 Control Internet Explorer Security Settings
•	 Control Network Folder Sharing / Interface / Traffic
•	 Control Power Options, Screen Lock
•	 Provide Wireless Connection Manager (Zero configuration)
•	 Control WLAN
•	 Deploy Files
•	 Inspect TCP Connections
•	 Manage ARP Table
•	 Install / Remove softwares
•	 Run Script
•	 Terminate Process
Network Access Control
IP Address Management Policy
•	 Trusted IP/MAC lifetime management
•	 Block IP changes, Prevent IP conflicts
Classification & Enforcement Policy
•	 Node Group: Dynamic Group using over 500 Conditions
•	 Define network access rule per each node group  
(Node group + Permissions)
•	 Permissions: Network range, Services, Time
Multi-layered Enforcement Method
•	 Layer 2: ARP Poisoning (Network Sensor)
•	 Layer 3: TCP reset (Mirror Sensor)
•	 Layer 3: Inline enforcer (Dual-homed Gateway)
•	 Endpoint: Agent-based control
•	 802.1x: Built-in RADIUS server
•	 DHCP: Built-in DHCP server
•	 Switch: Port shutdown (SNMP)
Network
•	 MAC/IP (IPv4 / IPv6)
•	 Hostname / Domain
•	 DNS Name
•	 NIC Vendor
•	 SSID
•	 Connection Type
•	 Switch Port
•	 Traffics
•	 TCP Connections
•	 Services
•	 Open Port
Anomaly
•	 ARP spoofing
•	 ARP bombing
•	 MAC/IP cloning
•	 Invalid Gateway
•	 Ad Hoc Network
•	 Port Scan
•	 Unknown Service Request
Security*
•	 Compliance status
•	 OS Patches and Updates
•	 Antivirus
•	 Firewall
•	 Screen Lock
•	 Password Check
•	 Logs
Hardware Installed*
•	 Motherboard
•	 CPU
•	 Memory
•	 Hard drives / Storage size
•	 NIC (Wired, Wireless)
•	 Operating System
Peripherals*
•	 USB Devices
•	 Monitor, Printer
Operating System*
•	 Type
•	 Version
•	 Languages
•	 Sharing folders
•	 Web browser
•	 WMI status
Software installed*
•	 Name
•	 Version
•	 Installed date
•	 Installed path
•	 Detected date
•	 Removed date
Device Information
•	 Device name
•	 Platform name
•	 Node Type
•	 Connection status
•	 Authentication status
•	 NAT Device
Device Lifecycle
•	 Actual device image
•	 Manufacturer name
•	 Manufacturer Headquarters
•	 Manufacturer Business Status
•	 Common Vulnerabilities and
Exposures (CVE)
•	 End of Sales / Support
User
•	 Username
•	 Account info
•	 Contact info
•	 RADIUS Authentication
* Agent required
North America
50 High Street, Suite 45
North Andover, MA, 01845
United States of America
hello@genians.com
+1-617-307-4090
East Asia
ACE Pyeongchon Tower, 8th floor
361 Simindaero, Dongan-gu Anyang-si
Gyeonggi-do, South Korea
geni@genians.com
+82-31-422-3823
Over 1,100 happy customers around the world trust Genian NAC Solution to maximize their network security and IT operational efficiencies
TOGETHER, MORE SECURE.
Encompass IT Security Management and Operation

More Related Content

PPTX
Wild Animals
PPSX
Wild animals
PPTX
Pps the animals
PPTX
Go away Big Green Monster
PDF
The Greedy Dogg 1.pdf
ODP
Animals sounds presentation.
PPTX
The mouse and the lion
PPTX
Goldilocks and the three bears
Wild Animals
Wild animals
Pps the animals
Go away Big Green Monster
The Greedy Dogg 1.pdf
Animals sounds presentation.
The mouse and the lion
Goldilocks and the three bears

What's hot (14)

PDF
Urdu Alphabet PPT 1 - Copy (1).pdf
PDF
Oregon driver manual (2016 2017)
PPTX
Gingerbread man
PPT
Homonyns, homophones, homographs
PPTX
Animals vocabulary disney
PDF
Gingerbread man-story-book
PPTX
The frog prince edtc story
PPTX
The Boy And The Apple Tree
PDF
Wild animals
PPTX
Letterland Alphabet Songs
DOCX
The Addams family
PPT
Go away big green monster
PPTX
The Three Little Pigs and the Big Bad Wolf
PPT
VOCABULARY : food and drink.
Urdu Alphabet PPT 1 - Copy (1).pdf
Oregon driver manual (2016 2017)
Gingerbread man
Homonyns, homophones, homographs
Animals vocabulary disney
Gingerbread man-story-book
The frog prince edtc story
The Boy And The Apple Tree
Wild animals
Letterland Alphabet Songs
The Addams family
Go away big green monster
The Three Little Pigs and the Big Bad Wolf
VOCABULARY : food and drink.
Ad

Similar to Genian NAC Datasheet (20)

PDF
Genian NAC Overview
PPT
Uac sales pres_20_apr09-2
PDF
BOSNOG NAC stack 2018
PPTX
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
PPTX
ISE_2.1_BDM_v3a.pptx
PPTX
Network Control Access for Non-IT Professionals
PDF
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
PPTX
Cisco Identity Services Engine (ISE)
PDF
347177946-ForeScout-Next-Generation-NAC-Presentation.pdf
PDF
Is Your Network Ready for the Age of IoT?
PDF
What we learned from MISA Ontario 2020 Infosec
PPTX
OwnYIT CSAT + SIEM
PDF
Throughwave Day 2015 - ForeScout Automated Security Control
PDF
A modern approach to safeguarding your ICS and SCADA systems
PPTX
Windows 7 And Windows Server 2008 R2 Combined Value
PDF
Cyberoam-Techsheet
PPTX
Identify and mitigate high risk port vulnerabilities
PPTX
Sem cis ise
PDF
Nozomi Networks SCADAguardian - Data-Sheet
PDF
Fore scout nac-datasheet
Genian NAC Overview
Uac sales pres_20_apr09-2
BOSNOG NAC stack 2018
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
ISE_2.1_BDM_v3a.pptx
Network Control Access for Non-IT Professionals
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Cisco Identity Services Engine (ISE)
347177946-ForeScout-Next-Generation-NAC-Presentation.pdf
Is Your Network Ready for the Age of IoT?
What we learned from MISA Ontario 2020 Infosec
OwnYIT CSAT + SIEM
Throughwave Day 2015 - ForeScout Automated Security Control
A modern approach to safeguarding your ICS and SCADA systems
Windows 7 And Windows Server 2008 R2 Combined Value
Cyberoam-Techsheet
Identify and mitigate high risk port vulnerabilities
Sem cis ise
Nozomi Networks SCADAguardian - Data-Sheet
Fore scout nac-datasheet
Ad

Recently uploaded (20)

PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PPTX
Microsoft User Copilot Training Slide Deck
PPTX
Internet of Everything -Basic concepts details
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Advancing precision in air quality forecasting through machine learning integ...
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
LMS bot: enhanced learning management systems for improved student learning e...
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
Microsoft User Copilot Training Slide Deck
Internet of Everything -Basic concepts details
NewMind AI Weekly Chronicles – August ’25 Week IV
4 layer Arch & Reference Arch of IoT.pdf
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
SGT Report The Beast Plan and Cyberphysical Systems of Control
Co-training pseudo-labeling for text classification with support vector machi...
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
Data Virtualization in Action: Scaling APIs and Apps with FME
Introduction to MCP and A2A Protocols: Enabling Agent Communication
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf

Genian NAC Datasheet

  • 1. ARCHITECTURE Genians has reimagined Network Access Control to maximize network security and IT operational effectiveness by leveraging its distinct Device Platform Intelligence (DPI). Provides extremely accurate IT asset identifica- tion/classification based on its robust DPI, which allows for the full interrogation and gathering of all device platform information, combining technology-specific with business-contextual and risk-level data. Device Platform Identity • The name of Device Platform consists of man- ufacturer, device name, model number • The actual picture of the device platforms • The list of device fingerprinting sources • Network connection type (Wired, Wireless) • Released Date Device Platform Context • Product end of life (EOL) • Product end of support (EOS) • Manufacturer business status • Manufacturer location (Country) • Manufacturer homepage Device Platform Risk • Common Vulnerabilities and Exposures (CVE) • Report manufacturer/vendor going out of business or being acquired, which can intro- duce systems that cannot be upgraded or patched Delivers all-in-one solutions that encompass both IT security and operations management very effectively. • Network Surveillance • Network Access Control • Mobile, BYOD, Guest Management • IP Address Management (IPAM) • Switch Port Management • WLAN Security • Endpoint Security • IT Security Automation Integrates a wide range of IT security and business solutions (Firewall, IDS/IPS, VM, MDM, SIEM, APT, DLP, CMDB etc.) into each enterprise’s Policy Serv- er to ensure unified policy enforcement. Genian NAC supports custom integration using Syslog, Webhook, REST API, and Syslog. Monitors your network through personalized dashboards (Over 100 custom widgets to meet your network management needs). Performs compliance checks in real-time to ensure that all connected devices are automati- cally identified, classified, authorized, and given policy-based access control to ensure the highest levels of IT security, availability, and resilience. BASIC Network Surveillance PROFESSIONAL Network Access Control ENTERPRISE Automation On-Premises Free up to 300 devices* 30 days free trial Contact a Genians Partner Cloud-Managed Policy Server in the Cloud 30 days free trial Support up to 3,000 devices* CSP-Ready NAC as a service Contact Genians Choose the edition that best meets your business requirements. Upgrade between editions as your network evolves without losing your original investment. The editions can be delivered in 3 different ways: Policy Server Agent IDENTI TY C ONTEXT RISK DPI • Validate device platform information via the cloud • Delivers the most accurate up-to-date device platform information to Policy Servers on a weekly basis • Scans and assesses networks (Wired, Wireless, Virtual) • Detects all SSIDs by listening wifi signals • Identifies who is accessing enterprise-owned, neighbor or rogue APs • Enforces access control policies • Supports 802.1q Trunk Port • Manages installed HW/SW information • Detects state changes in real time • Performs incremental updates • Controls all desktop configurations • Provides Wireless Connection Manager (EAP-GTC) • Supports Windows/macOS /Linux • Lightweight Agent • Establishes security policies based on Node information collected by Network Sensors and Agents • Distributes established policies to Network Sensors and Agents • Integrates with user database and third-party security solutions • Includes Built-in DHCP, RADIUS, Syslog server * Can be hosted On-Prem or in the Cloud * Optional Genian NAC uses Layer 2 based non-disruptive sensing technology powered by its Device Platform Intelligence. EDITIONS & VERSIONS * Only count the number of active devices Next-Gen Network Access Control for the IoT era You can install the Policy Server and Network Sensor software in either your Virtual or Physical machines (Intel Xeon or equivalent). Completely out-of-band, Highly scalable You Choose, We Deliver DATASHEET
  • 2. FEATURES Network Surveillance Desktop Configuration Management* • Change Computer Name • Check Password Validation • Collect System Information Using WMI • Configure Windows Security Settings • Control OS Updates (Works for isolated network) • Configuring 802.1X Wired Authentication Profile Settings • Control Antivirus Software Settings • Control DNS • Control External Device (e.g. USB, Printer) • Control Internet Explorer Security Settings • Control Network Folder Sharing / Interface / Traffic • Control Power Options, Screen Lock • Provide Wireless Connection Manager (Zero configuration) • Control WLAN • Deploy Files • Inspect TCP Connections • Manage ARP Table • Install / Remove softwares • Run Script • Terminate Process Network Access Control IP Address Management Policy • Trusted IP/MAC lifetime management • Block IP changes, Prevent IP conflicts Classification & Enforcement Policy • Node Group: Dynamic Group using over 500 Conditions • Define network access rule per each node group   (Node group + Permissions) • Permissions: Network range, Services, Time Multi-layered Enforcement Method • Layer 2: ARP Poisoning (Network Sensor) • Layer 3: TCP reset (Mirror Sensor) • Layer 3: Inline enforcer (Dual-homed Gateway) • Endpoint: Agent-based control • 802.1x: Built-in RADIUS server • DHCP: Built-in DHCP server • Switch: Port shutdown (SNMP) Network • MAC/IP (IPv4 / IPv6) • Hostname / Domain • DNS Name • NIC Vendor • SSID • Connection Type • Switch Port • Traffics • TCP Connections • Services • Open Port Anomaly • ARP spoofing • ARP bombing • MAC/IP cloning • Invalid Gateway • Ad Hoc Network • Port Scan • Unknown Service Request Security* • Compliance status • OS Patches and Updates • Antivirus • Firewall • Screen Lock • Password Check • Logs Hardware Installed* • Motherboard • CPU • Memory • Hard drives / Storage size • NIC (Wired, Wireless) • Operating System Peripherals* • USB Devices • Monitor, Printer Operating System* • Type • Version • Languages • Sharing folders • Web browser • WMI status Software installed* • Name • Version • Installed date • Installed path • Detected date • Removed date Device Information • Device name • Platform name • Node Type • Connection status • Authentication status • NAT Device Device Lifecycle • Actual device image • Manufacturer name • Manufacturer Headquarters • Manufacturer Business Status • Common Vulnerabilities and Exposures (CVE) • End of Sales / Support User • Username • Account info • Contact info • RADIUS Authentication * Agent required North America 50 High Street, Suite 45 North Andover, MA, 01845 United States of America [email protected] +1-617-307-4090 East Asia ACE Pyeongchon Tower, 8th floor 361 Simindaero, Dongan-gu Anyang-si Gyeonggi-do, South Korea [email protected] +82-31-422-3823 Over 1,100 happy customers around the world trust Genian NAC Solution to maximize their network security and IT operational efficiencies TOGETHER, MORE SECURE. Encompass IT Security Management and Operation