Genian NAC Comparison - Advantage
Genian NAC Comparison - Advantage
1 General
1.1 Number of Devices Supported
1.2 Number of Networks Supported
1.3 Out-of-Band Configuration
1.4 Infrastructure Agnostic
1.5 Manufacturer Agnostic
1.6 Single Management Console
1.7 Web-based Management Console
1.8 Agentless Operation
1.9 Agent-based Operation
1.1 Secure Communication
1.11 Failure Safe
1.12 High Availability
1.13 Custom Web/Agent Plugins
1.14 RESTful API
2 Node Visibility
2.1 Realtime Detection
2.2 Layer 2 Network Sensor
2.3 Support 802.1Q Trunk Port
2.4 Support Channel Bonding
2.5 Node Information
2.6 Domain/Hostname Detection
2.7 OpenPort Scanning
2.8 Service Detection
2.9 Node Activity Monitoring
2.1 Platform Detection
2.11 Platform Business Information
2.12 Update Platform Database
2.13 Unknown/Wrong Platform Report
2.14 Node Tagging
2.15 DHCP Detection
2.16 Dynamic Grouping
2.17 Custom Fields
3 Network Visibility
3.1 Switch Information
3.2 Connected Switch Port
3.3 Switch Port Description
3.4 Switch Port Shutdown
3.5 Switch Auto Detection
3.6 WLAN Detection
3.7 WLAN Information
3.8 Internal WLAN Detection
3.9 WLAN Connection Monitoring
3.1 Rogue AP Detection
3.11 Physical Location Tracking
3.12 Wireless / Wired Device Mapping
3.13 Wireless Network Sensor
3.14 Wireless Agent Sensor
3.15 Risk Detection
4 Endpoint Visibility
4.1 Agent Support
4.2 Windows Support
4.3 macOS Support
4.4 linux Support
4.5 OS Information
Provide the link status, duplex, speed, utilization, security setting, and 802.1X configuration information of the switch and each port
through SNMP
Provide the integration
switch name and port information to which the node is connected
Change the description of the switch port via SNMP
Execute administrative shutdown of the switch port via SNMP
Automatically register the switch using the node SNMP service detection information
Detect neighbors' Access Point information in real time through network sensors and agents
Provide SSID, security setting, channel, signal strength, location, and detection time information for the detected wireless LAN Access
Point
Automatically detect that the access point is connected to the internal network
Provide a list of stations that are connected to the Access Point and be able to identify which stations are known on the internal network
Identify any Access Points not acknowledged by network administrator
Discover the physical location of AP
Provide wired-LAN information of the device providing the wireless-LAN access point
Collect wireless LAN information through a network sensor equipped with a wireless LAN interface
Collect wireless LAN information through an agent-installed PC with a wireless LAN interface
Provide Layer 2-based risk detection (abnormal traffic), including:
- Invalid DHCP Server
Provide Windows and macOS Agents to present more details in real-time and control endpoint system cofiguration
Provide Agent-based functions to Windows (XP or higher)
Provide Agent-based functions to macOS 10.10 (Yosemite)
Provide the following information and detect any changes in real time:
- OS Name, Version, Service Pack, Language, Login User, Install Time
- Login Password, Screen Lock, IE Version, Shared Folder, etc.
Provide the following hardware information and detect any changes in real time:
- Motherboard, CPU, Memory, Storage, Network Interface Card, Battery, USB Device, Monitor, Printer, etc.
Provide software information and detect any changes in real time:
- Software
Provide name,software
antivirus version, information
path, date of
andinstallation,
detect anyetc.
changes in real time:
- Antivirus
Provide OSname,
updateversion, Whether
information and real-time
detect anymonitoring
changes inis real
enabled,
time: Latest update time, Latest scan time
- State the
Update of update
policy installation, Installed
server only when updateoccur
changes name,
in Settings
real time of
orupdate service
periodically
Provide the following options to check information periodically, based on your requirements:
- File presence, Hash, Date
Provide system information collection through the WMI interface
Detect network interfaces that are not authorized by the administrator
Provide a custom webpage to download Agent
Deploy Agent through a GPO in Active Directory
Operate as a user-level application to minimize system malfunctions and performance impact
Automatically upgrade without user involvement
Perform upgrades on segmented targets
Allow to delete Agent by only authorization code, which is provided by the administrator.
Provide the following options to hide Agent:
- Agent Agent
Prevent installation
being removed or terminated by the end user
Provide device access control based on MAC address so that devices with unauthorized MAC addresses can connect to network after
receiving administrator's
Provide access authorization
control based on device identity, which will be measured by the following options:
- Node type
Provide access control if a device is not compliant. The compliance status will be measured by the following options:
- Required software access
Establish a different install control policy based on the role of user and device, and grant access to appropriate network, service, and
time zone
Update by privilege
policies in real time
Redirect HTTP (or HTTPS) requests to a custom web page to be remediated or access to right network resources
Modify the messages and UI in the CWP
Customize the buttons in the CWP to meet your requirements. The options will be provided like below:
- External
Provide page link
consent page including terms and conditions for users connecting to the network. In addition, get custom data from users during
the onboarding
Provide process
out-of-band enforcement to prevent network service disruption in the event of a system malfunction
Provide Layer 2-based access control using ARP Enforement
Provide Layer 3-based access control using Mirrorring (SPAN) ports
Control (shutdown) a switch port if non-compliant devices are connected
Control Network Sensor mode: Monitor only or Policy Enforcement
Control endpoints' Network Inferface and power using Agent
Monitor current IP usage in real-time. (Used IP, unused IP, IP conflict, IP shortage)
Keep the history of IP usages (past 12 months) and retrieve node information with IP address at a specific time if needed
Manage IP usage through the Matrix View Table, where administrators are able to select and visualize the desired IP state
Use only authorized IP through the IP policy in the network
Set the lifetime of an IP or MAC to be valid for a specific period of time
Specify which users can perform user authentication only on a specific IP
Protect important IP's by enabling only an authorized MAC through the IP policy to use a specific IP. If an unauthorized MAC attempts to
use a protected
Restrict IP, it must
unauthorized provideby
IP changes a GARP response
restricting the IP to prevent
that IP use.
a particular If andevice
MAC IP collision
can useoccurs, a detox ARP transmission function
should be provided to minimize service interruption
Provide a DHCP service that supports IP-helper addresses. For IP assignment requests, IP must be assigned only to authorized devices
according
Provide IPto IP policies
request and approval system for unauthorized IP (Guest, BYOD)
(Windows) Change the Antivirus software configuration for Windows machines
(Windows) Change the computer name to the specified template format
(Windows) Provide password checking for local accounts, including:
- Same with
(Windows) Geniana NAC
Provide password
security policy function that includes:
configuration
- DisablingProvide
(Windows) Guest Account
Static ARP management to prevent ARP spoofing
(Windows) Provide DNS configuration and hosts' file management
(Windows) Control the folder sharing settings
(Windows) Install new applications or delete installed applications
(Windows) Provide Internet option configuration function that includes:
- Homepage
(Windows) Enforce screen lock-related settings
Inspect PCs connected to multiple networks at the same time control the network interface connection according to specified conditions
(Windows) Disable the wireless LAN interface or prohibit Soft AP operation
(Windows) Terminate run of specified process(es)
Provide users with the ability to deliver key events or manager messages via pop-up windows
(Windows) Provide the ability to run batch files or VB Scripts set by the administrator
(Windows) Provide ability to provision profiles for wireless LAN connection and control SSIDs accessible through the whitelist
(Windows) Provide the update file cache function through the network sensor equipped with the HDD so that the network bandwidth
usage can be reduced when downloading the update file of the sensor managed node
(Windows) Provide a function to keep the device in a disabled state when connecting to a device by setting a block policy using Name,
Class, Type,
(Windows) Description
Establish forthrough
policy the device connected
vendor, model,toserial
the system.
No. for devices connected through USB interface and to keep it in a disabled
state when Provide
(Windows) connected
theto the corresponding
service device.
to use a device for a specified period of time through the administrative approval process
Yes No No No No
Yes Yes No No No
Yes Yes Yes Yes No
Yes Yes Yes Yes No
Yes Yes Yes Yes No
Yes Yes Yes Yes No
Yes Yes No Yes No
Yes No No Yes(RFProtect or WIPS) No
Yes Yes Yes Yes No
Yes Yes Yes Yes No
Yes Yes Yes Yes No
Yes Yes No Yes No
Yes Yes No No No
Yes Yes No No No
Yes Yes No No No
Yes Yes No No No