Cloudpath Enrollment System

Security and Policy Management

The Cloudpath Enrollment System (ES) security and policy management platform makes it easy to deliver awesome experiences—for users, visitors, guests and IT. Protect your network by easily and definitively securing users and their wired and wireless devices no matter how tough the environment— while freeing users and IT from the tyranny of passwords.

Available as a cloud-managed or virtual instance solution and priced per user, Cloudpath software lets IT use one system to do what usually requires many. At the same time, it easily and automatically integrates with your existing access and network security infrastructure.

Put Passwords in Your Rear-View Mirror

Cloudpath ES software includes a built-in, comprehensive Certificate Authority (CA) that makes it easy for any IT department to create and manage its own Public Key Infrastructure (PKI). With PKI, your organization is protected by the gold standard in wireless security: WPA-2 Enterprise via X.509 certificates. Passwords—which make up the vast majority of most organization’s trouble tickets and create endless headaches for users — are just a memory.

Network Access Control: It's a Must

Certificates are one part of the Cloudpath security equation. Policy-based access control is the other. With Cloudpath ES software, IT can associate each device with a user and establish fine-grained policies for both. The software works together with policy enforcement points to make unauthorized access and persistent bad behavior a thing of the past.

Now, about those BYOD Devices

Just getting devices securely onto the network is half the battle for IT; bring your own device (BYOD) adds more time and complexity. What if users—even BYOD users—could self-onboard any and all of their devices? With the simple onboarding portal in Cloudpath ES, they can. IT can control the types of devices that are allowed access and ensure the requisite on-device enforcement, all while dramatically reducing service and trouble tickets.

The Missing Link: Guest Access

You've secured owned and BYOD devices, but what about guests and their devices? Cloudpath software includes comprehensive guest access functionality that secures guest devices just as easily and thoroughly as the rest, while providing abundant authentication options. And Cloudpath software is infrastructure-agnostic, so no matter the environment, you can treat all of your guests the same—or differently.

Certificate Authority Management
Improve network security by replacing unsecure approaches—passwords, pre-shared keys, MAC authentication—with certificates
Use multiple certificate sources including built-in Public Key Infrastructure (PKI), Microsoft CA and InCommon
Create a unique CA for each tenant, if you choose, in multi-tenant environments
Secure Access
Connect devices using the gold standard for security: WPA2-Enterprise via 802.1x authentication with EAP-TLS, PEAP access methods
Access Control
Push dynamic Access Control Lists (ACL) to wired or wireless infrastructure via RADIUS Vendor-Specific Attributes (VSA)
Perform automatic device posture check and remediation via dissolvable/temporary agent, ensuring that all devices seeking access meet minimum requirements
Self-Service Onboarding with Pre-Boarding
Empower end users to easily manage their own access and devices—and remove that burden from IT—with a customizable, self-service onboarding portal
Use “pre-boarding” to enable end users to onboard a device from anywhere the device can access the network—for example, allowing students to onboard their devices from home, before they arrive on campus
Simplify onboarding for all the devices in your environment—enterprise-owned, BYOD, guest and IoT
Policy Management
Implement granular per-user, per-device policies such as VLANs and application-based access to ensure a secure, high-performing network
Use Cloudpath software APIs to easily and automatically integrate with policy enforcement points such as switches, firewalls and content filters
Guest Access
Extend secure Wi-Fi to visitors of all varieties, onboarding guests onto WPA2-Enterprise wireless networks without IT lifting a finger
Implement a variety of traditional authentication and authorization options, including sponsorship and self-verification, as well as integration of secure Wi-Fi with external identity services, such as Google, Facebook and LinkedIn
Track guests across the network for security and compliance requirements and guest auditing
Gain granular visibility into users and devices accessing the network, including when, how and for how long they access
Chromebook Integration
Distribute certificates to managed Chromebooks using the Google Admin Console
Simplify initial Chromebook setup with user-driven, IT-driven or distributor-driven approaches

No more Passwords! Hassle-Free Wi-Fi Access

On Demand

Learn how you can avoid angry tweets to the Chancellor about the hassle of password resets and lockouts in our upcoming live webinar. We will discuss how Ruckus Cloudpath software can rid your campus of password tyranny and provide remote secure onboarding to avoid move-in day help desk overload.

Securing Chromebook Classrooms Made Easy

On Demand

Only 52% of online edtech software require encryption of login and personal information. Luckily, Ruckus and Lightspeed can help you deploy your Chromebooks securely, so you can easily monitor and manage them in your classroom hassle-free. Watch our webinar to find out how.

The Swiss Army Knife for Lean IT to Secure Campus Networks

On Demand

Fast, reliable Wi-Fi and self-service BYOD access is our proven formula for success. Watch this webinar to learn how our Swiss Army Knife, Ruckus Cloudpath software, can help you provide remote secure onboarding to avoid move-in day help desk overload and rid your campus of password tyranny. 

Hassle-free Access: Passwords, Pre-Boarding & eduroam

On Demand

How many hours per week do you spend on password-related help desk tickets – especially from incoming freshman? Spare an hour, and listen to this webinar to learn how to rid your campus of password tyranny and simplify secure onboarding.

Simple & Secure Onboarding for BYOD

On Demand

Listen to Nick Wright, ICT Services Manager for Blackpool & The Fylde College, explain how implementing a secure network with increased capacity ​and a certificate-based security approach solved the challenges that were plaguing his IT staff.

How to Secure Every Device and Protect Your Network

On Demand

Learn how the combination of certificates and granular user and device policy management can improve or round out your security implementation—not just for employees but for guests and BYOD users, as well.

セキュアなデバイス オンボーディングと Cloudpath



2005 年は遠い過去になり、非常にセキュアでシンプルなワイヤレス デバイス オンボーディングを妨げるものは何もありません。ラッカス Cloudpath ソフトウェアを使用すれば、エンタープライズ、官公庁、教育機関は簡単にセキュアなオンボーディングを行えるようになります。


公共 WiFi ホットスポットは、ゲストと訪問者の満足度を高めるための優れた手段です。施設滞在時間を増やし、直接的および間接的に収益の増加につながりますが、とにかく施設またはキャンパスでの体験を向上させたい場合にも有効です。ところが、ほとんどの場合、公共ホットスポットではセキュリティが保護されておらず、暗号化さえもありません。保護されていないホットスポットに伴うセキュリティ リスクについて理解するユーザーが増えると、こうしたユーザーはホットスポットへの接続を躊躇するようになります。その結果、活動が限定され、公共 WiFi 導入のそもそもの動機となった価値が減ってしまいます。

Cloudpath ソフトウェアを使用するセキュアなオンボーディングでは、ゲストは煩雑な操作を行わずにセキュアに公共ホットスポットに接続できます。ゲストは一度オンボーディングすれば、同じローミング協定の下で設定されているどのホットスポットにもローミングできます。ゲストは WLAN に関連付けられると同時にブランデッド Web ポータルに誘導され、その時点でセキュア アクセスまたはオープン アクセスを選択できます。専有の自動デバイス イネーブルメント (ADE) で、デバイスのセキュリティは数秒以内に確保されます。これらすべてが断然優れた接続と比類のないユーザー体験につながるのです。

セキュア ゲスト アクセス



セキュア ゲスト アクセスを使用すると、訪問者は自分のセキュリティもネットワークのセキュリティも犠牲にすることなく公共 WiFi ネットワークを使用できます。


公共 WiFi ホットスポットは、施設訪問者の滞在時間を伸ばしゲスト満足度を高めるための優れた手段です。ところが、ほとんどの場合、公共ホットスポットではセキュリティが保護されておらず、暗号化さえもありません。保護されていないホットスポットに伴うセキュリティ リスクについて理解するユーザーが増えると、こうしたユーザーはホットスポットへの接続を躊躇するようになります。そうなると、ユーザーは限られた活動にしかホットスポットを使用しなくなります。これでは、公共 WiFi 導入のそもそもの動機となった、直接または間接の収入機会を逃してしまいます。

Cloudpath ソフトウェアを使用するセキュアなオンボーディングでは、ゲストは煩雑な操作を行わずにセキュアに公共ホットスポットに接続できます。ゲストは一度オンボーディングすれば、同じローミング協定の下で設定されているどのホットスポットにもローミングできます。ゲストは WLAN に関連付けられると同時にブランデッド Web ポータルに誘導され、その時点でセキュア アクセスまたはオープン アクセスを選択できます。専有の自動デバイス イネーブルメント (ADE) で、デバイスのセキュリティは数秒以内に確保されます。