Security and Policy Management for Simply Better Connections

The Cloudpath Enrollment System (ES) security and policy management platform makes it easy to deliver awesome experiences—for users, visitors, guests and IT. Protect your network by easily and definitively securing users and their wired and wireless devices no matter how tough the environment— while freeing users and IT from the tyranny of passwords.

Available as a cloud-managed or virtual instance solution and priced per user, Cloudpath software lets IT use one system to do what usually requires many. At the same time, it easily and automatically integrates with your existing access and network security infrastructure.

Put Passwords in Your Rear-View Mirror

Cloudpath ES software includes a built-in, comprehensive Certificate Authority (CA) that makes it easy for any IT department to create and manage its own Public Key Infrastructure (PKI). With PKI, your organization is protected by the gold standard in wireless security: WPA-2 Enterprise via X.509 certificates. Passwords—which make up the vast majority of most organization’s trouble tickets and create endless headaches for users — are just a memory.

Network Access Control: It's a Must

Certificates are one part of the Cloudpath security equation. Policy-based access control is the other. With Cloudpath ES software, IT can associate each device with a user and establish fine-grained policies for both. The software works together with policy enforcement points to make unauthorized access and persistent bad behavior a thing of the past.

Now, about those BYOD Devices

Just getting devices securely onto the network is half the battle for IT; bring your own device (BYOD) adds more time and complexity. What if users—even BYOD users—could self-onboard any and all of their devices? With the simple onboarding portal in Cloudpath ES, they can. IT can control the types of devices that are allowed access and ensure the requisite on-device enforcement, all while dramatically reducing service and trouble tickets.

The Missing Link: Guest Access

You've secured owned and BYOD devices, but what about guests and their devices? Cloudpath software includes comprehensive guest access functionality that secures guest devices just as easily and thoroughly as the rest, while providing abundant authentication options. And Cloudpath software is infrastructure-agnostic, so no matter the environment, you can treat all of your guests the same—or differently.

Certificate Authority Management
Improve network security by replacing unsecure approaches—passwords, pre-shared keys, MAC authentication—with certificates
Use multiple certificate sources including built-in Public Key Infrastructure (PKI), Microsoft CA and InCommon
Create a unique CA for each tenant, if you choose, in multi-tenant environments
Secure Access
Connect devices using the gold standard for security: WPA2-Enterprise via 802.1x authentication with EAP-TLS, PEAP access methods
Access Control
Push dynamic Access Control Lists (ACL) to wired or wireless infrastructure via RADIUS Vendor-Specific Attributes (VSA)
Perform automatic device posture check and remediation via dissolvable/temporary agent, ensuring that all devices seeking access meet minimum requirements
Self-Service Onboarding with Pre-Boarding
Empower end users to easily manage their own access and devices—and remove that burden from IT—with a customizable, self-service onboarding portal
Use “pre-boarding” to enable end users to onboard a device from anywhere the device can access the network—for example, allowing students to onboard their devices from home, before they arrive on campus
Simplify onboarding for all the devices in your environment—enterprise-owned, BYOD, guest and IoT
Policy Management
Implement granular per-user, per-device policies such as VLANs and application-based access to ensure a secure, high-performing network
Use Cloudpath software APIs to easily and automatically integrate with policy enforcement points such as switches, firewalls and content filters
Guest Access
Extend secure Wi-Fi to visitors of all varieties, onboarding guests onto WPA2-Enterprise wireless networks without IT lifting a finger
Implement a variety of traditional authentication and authorization options, including sponsorship and self-verification, as well as integration of secure Wi-Fi with external identity services, such as Google, Facebook and LinkedIn
Track guests across the network for security and compliance requirements and guest auditing
Gain granular visibility into users and devices accessing the network, including when, how and for how long they access
Chromebook Integration
Distribute certificates to managed Chromebooks using the Google Admin Console
Simplify initial Chromebook setup with user-driven, IT-driven or distributor-driven approaches

안전한 장치 온보딩 및 Cloudpath

보안 및 온보딩


지금은 더 이상 2005년이 아닙니다. 따라서 무선 장치 온보딩이 안전하고 간단하지 못할 이유가 없습니다. Ruckus Cloudpath 소프트웨어는 기업, 정부 기관 및 교육 기관에서 안전하고 손쉬운 온보딩을 가능하게 해줍니다.

사용자가 관심을 가져야 하는 이유:

수십억 개에 달하는 무선 장치와 신규 장치가 계속 시장에 선보이고 있는 가운데 사용자는 마치 서부 개척 시대에 있다고 느껴질 수 있습니다. Cloudpath를 사용하면 IT 팀 보유 장치 및 BYOD 장치를 빠르게 자동으로 온보딩할 수 있습니다. Cloudpath는 2006년에 셀프 서비스 WiFi 온보딩을 개발하여 매년 수백만 대의 개인용 단말을 탑재하고 있습니다. 표준 기반의 보안, 강력한 암호화 및 유연한 정책 제어를 통해 네트워크에 유입되는 모든 장치로 엔터프라이즈급 보안을 확대할 수 있습니다.

안전한 게스트 액세스

보안 및 온보딩


안전한 게스트 액세스는 방문자가 자기 자신이나 네트워크의 보안에 영향을 주지 않으면서 공용 WiFi 네트워크를 사용할 수 있게 해주는 기술입니다.

사용자가 관심을 가져야 하는 이유:

공용 WiFi 핫스폿은 시설에 사람들이 더 오래 머물게 만들고 게스트 만족도를 향상시켜 주는 탁월한 방법입니다. 그러나 대부분 공용 핫스폿은 보안 보호 기능은 물론 암호화조차 제공하지 않습니다. 보호되지 않은 핫스폿에 내재된 보안 위험을 인지하는 사용자가 늘어나면서 핫스폿의 사용을 주저하는 경우가 많아지고 있습니다. 이 경우, 활동에 제약이 생길 가능성이 높습니다. 따라서 기업에서 공용 WiFi를 우선적으로 구축하게 만들었던 직접 또는 간접 수익도 줄어들게 됩니다.

Cloudpath 소프트웨어를 사용한 안전한 온보딩을 통해 게스트는 공용 핫스폿에 간편하고 안전하게 연결할 수 있습니다. 게스트 온보딩이 이루어지면 동일한 로밍 컨소시엄 하에서 구축된 모든 핫스폿으로 로밍할 수 있습니다. 게스트가 WLAN에 연결하는 즉시 보안 액세스 또는 개방형 액세스를 선택할 수 있는 브랜드 웹 포털로 연결됩니다. 독점 기술인 ADE(자동화된 단말 지원)를 통해 몇 초 만에 장치에 보안이 적용됩니다.