CounterACT - License - volume - 1000+ level Product Details
Network Access Control & Compliance Management
CounterACT has been lauded as the most effective, peoplefriendly and productivity-enabling NAC solution on the market. It automates network access and brings devices into security
policy compliance without disrupting the user.
Policy Creation Engine. Offers flexibility to create the right network policies for each individual enterprise. For corporate policies, CounterACT offers out-of-the-box templates and a simple, easy-touse wizard-based process that guides the IT staff through every step of policy creation. For regulatory standards-based audits (PCI, SOX, HIPAA, FISMA, etc.), CounterACT offers kits that help streamline the compliance audit and reporting process. Policy Compliance Engine. Leverages IT infrastructural and CounterACT’s built-in enforcement mechanisms to automate user and device compliance checks and to speed remediation or containment of out-of-compliant devices.
Allows IT staff to simulate and fully understand the impact of a specific policy on devices and users before enforcements are turned on.
Notifying the user of policy violations is the first step towards remediation. Automated notifications and actions -such as trouble ticketing, emails, browser hijacks and redirects - significantly reduce costly help desk overhead.
Access Control, Enforcement & Auto-Remediation
CounterACT limits non-compliant device access to specified resources, thus enabling users to remain productive while their device-compliance violations are addressed. For example, if a user
device is found to have an out-of-date anti-virus (AV) definition file, it can be moved to a VLAN, allowing the user to access email and Internet while blocking the device from other critical resources.
CounterACT can then work with existing services to provide guided remediation and/or cue the AV server to auto-update a specific device. Once remediation is complete and the device is found to be in compliance, complete access to the production network may be granted or restored. CounterACT integrates with a number of remediation services, including patch management, anti-virus, anti-spyware, vulnerability management, and more. These third-party integrations allow CounterACT to orchestrate and automate the process of correcting policy violations. For example, if a device misses a critical patch, CounterACT detects the policy violation and automatically cues the patching engine (Microsoft WSUS or SMS) to update the specific system. Often this can be done without the user’s involvement, retaining update report information for future security audits.
CounterACT provides the ability to completely block the access of any device on the network. This can be accomplished by simply turning off the switch port or by leveraging CounterACT’s built-in virtual firewall. The virtual firewall provides the ability to quarantine a device or a specific device port where malicious activity has been detected.
Post Connection Monitoring
After initial connection is made, access control policies are enforced on an on-going basis. CounterACT continuously monitors the network for policy violations and/or the introduction of self-propagating threats from connected devices. This advanced capability ensures that the network is always safe and devices are always in compliance with established network security policies.
CounterACT has a fully integrated reporting engine that allows report-generation filters to be applied to both current and historical data. The reports help IT staff monitor and control device
compliance and fulfill regulatory audit requirements.
^^ Concurrent Devices
^^ Network Ports
^^ I/O Support
1 serial port (RJ45)
^^ USB Port
3, USB 2.0-compliant
2 HDD (RAID-1)
2 @ up to 650W,
10°C to 35°C
1U 19” rack mount