Cloudpath Enrollment System

Secure Network Access for BYOD, Guest Users and IT-Owned Devices

Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired and wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network and secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access. It lets you deliver a great end-user experience and virtually eliminates helpdesk tickets related to network access. Choose from cloud-based or virtualized on-premises deployment. Cloudpath software supports any user, any device, and any network infrastructure.

Product Overview Video

Learn how Cloudpath Enrollment System delivers secure network onboarding and authentication for any user—and any device—on any network. This short video provides a quick overview of how Cloudpath software/SaaS increases network access security, simplifies getting BYOD and guest users connected and reduces the burden on IT.

Details

Increase Security for Users, Devices, Data and the Network

Cloudpath software secures network connections with WPA-2 Enterprise—the highest standard in secure Wi-Fi. The system encrypts data in transit between the device and Wi-Fi access points for maximum security. It lets you define and manage polices for network access so that users see only what they should see. You gain visibility and control over what devices are on the network, and the power to revoke access at any time. A device posture check with remediation during onboarding ensures that only devices with appropriate security safeguards in place gain access.

Streamline Network Access for BYOD Users

The sheer volume and diversity of devices that require network access can cause headaches for IT departments. What if BYOD users could self-provision their devices with intuitive self-service workflows? With the simple onboarding portal in Cloudpath software, they can. Users get a great experience without IT intervention. BYOD users initially gain access with existing login credentials. The system installs a digital certificate on the device so that users authenticate seamlessly from that point forward—without having to re-enter a Wi-Fi password.

Give Visitors Easy, Self-service Guest Wi-Fi

No matter what the environment—schools, colleges, hotels, public venues, or anywhere, really—the first thing visitors ask is “How do I get on the Wi-Fi?” Cloudpath software delivers secure guest access for visitors without involving the IT helpdesk. Guest users simply self-register for internet access via an intuitive portal and receive login information via SMS, email, or printed voucher. You can customize the login portal, guest workflows, terms and conditions, and more for a trouble-free and secure user experience.

Analyst Webinar: Does Your Method for BYOD Onboarding Compromise Network Security?

This on-demand webinar (no registration required) features Senior Analyst and Practice Director Bob Laliberte from industry analyst firm ESG. It highlights IT security risks related to common ways of providing network access for BYOD and guest users. The presentation draws on ESG research and includes recommendations for how to address the serious network access security issues discussed. It builds upon the recent ESG white paper, also titled "Does Your Method for BYOD Onboarding Compromise Network Security?"

Watch Now

New E-Book: Seven Network Access Security Risks—and How They Can Lead to a Data Breach.

Network access security is one risk area that IT organizations may underestimate. This e-book will help you to understand the risks.

Get the E-Book

Get a Live Demo

Fill out the form below to request a live online demo with a Ruckus representative.
(Licensed by user, not device; licenses start at 100 users minimum)

 

Features

Secure Network Access
Secure every connection for BYOD, guest, and IT-owned devices (including IoT) with WPA2-Enterprise via 802.1X authentication
Encrypt data in transit over the air between devices and wireless access points
Perform up-front security posture check with remediation during network onboarding
Gain visibility into what devices are on the network, with the power to revoke access at any time
Associate every device with a user for greater control over your IT environment
Self-Service Onboarding and Device Enablement
Empower BYOD and guest users to securely self-provision their devices for network access—without IT intervention
Tailor the user experience with customizable onboarding workflows and self-service portal
Prompt users to install software of your choice during onboarding
Certificate Management
Improve network security by using digital certificates for authentication
Manage your own Public Key Infrastructure (PKI) with built-in certificate authority—or use external certificate authorities
Use the built-in RADIUS server and user database—or third-party platforms
Policy Management
Create and manage granular per-user, per-device network access policies
Apply role-based access controls—users only see the network resources that they should see
Implement VLANs and application-based access for a secure, high-performing network
Third-Party Integration via APIs
Enhance network security through integration with web content filtering, next generation firewall and mobile device manage management products
Simplify Chromebook setup with user-driven, IT-driven or distributor-driven approaches
Facilitate inter-campus Wi-Fi roaming in higher education with eduroam integration

Ruckus Blog

https://theruckusroom.ruckuswireless.com/wp-content/uploads/2019/04/ESG-logo-hom...

New ESG webinar discusses risk areas for BYOD and guest access

Vernon Shure

Read More
https://theruckusroom.ruckuswireless.com/wp-content/uploads/2019/03/verizon-rsa-...

New Verizon report highlights data breach risk from insider threats

Vernon Shure

Read More
https://theruckusroom.ruckuswireless.com/wp-content/uploads/2019/02/ebook-blog-h...

New e-book links poor network access security to data breach risk

Vernon Shure

Read More
https://theruckusroom.ruckuswireless.com/wp-content/uploads/2019/01/eastern-eu-h...

Eastern Europe bank hack highlights the need for network access security

Vernon Shure

Read More
https://theruckusroom.ruckuswireless.com/wp-content/uploads/2019/01/rogue-access...

Phishing at the confluence of digital identity and Wi-Fi access

Vernon Shure

Read More
ESG white paper covers IT security aspects of BYOD onboarding

ESG white paper covers IT security aspects of BYOD onboarding

Vernon Shure

Read More
Three ways unsecured Wi-Fi can contribute to a data breach

Three ways unsecured Wi-Fi can contribute to a data breach

Vernon Shure

Read More
What Is Secure Onboarding, and Why Is It Such a Challenge?

What Is Secure Onboarding, and Why Is It Such a Challenge?

Vernon Shure

Read More
https://theruckusroom.ruckuswireless.com/wp-content/uploads/2018/08/blogimage-60...

What Is the Definition of a Data Breach, and Does Ransomware Count?

Vernon Shure

Read More
What’s Wrong with MAC Authentication and Pre-shared Keys (PSKs)

What’s Wrong with MAC Authentication and Pre-shared Keys (PSKs) for BYOD and Guest Wi-Fi Access, Part II: User and IT Experience

Vernon Shure

Read More
https://i0.wp.com/theruckusroom.ruckuswireless.com/wp-content/uploads/2018/03/th...

Wireless Eyes Are Watching – An Unexpected Benefit of Wi-Fi Security

Wendy Stanton

Read More
https://i2.wp.com/theruckusroom.ruckuswireless.com/wp-content/uploads/2018/03/th...

Secure Wi-Fi Access Using Dynamic Pre-Shared Keys

Vernon Shure

Read More
https://i2.wp.com/theruckusroom.ruckuswireless.com/wp-content/uploads/2018/01/th...

Securing BYOD and 1:1 Network Access in Primary and Secondary Schools

Staff

Read More
https://i2.wp.com/theruckusroom.ruckuswireless.com/wp-content/uploads/2017/11/47...

What’s Wrong with PSKs and MAC Authentication for BYOD?

Staff

Read More
https://i0.wp.com/theruckusroom.ruckuswireless.com/wp-content/uploads/2017/08/bl...

Heading into The Golden Era of Education Technology Solutions

Wendy Stanton

Read More
https://i2.wp.com/theruckusroom.ruckuswireless.com/wp-content/uploads/2017/08/fe...

Making Wireless Access and BYOD a Reality at your Agency

Chris Collura

Read More

Case Studies

https://res.cloudinary.com/ruckus-wireless/image/upload/ar_16:8,c_fill,g_auto,q_...

Networking Made Easy Through Single Pane of Glass

District of Mission

Read more
https://res.cloudinary.com/ruckus-wireless/image/upload/ar_16:8,c_fill,g_auto,q_... Forest Hills Public School District

Michigan. 10,000 students. 1:1 Chromebooks needed more than 30 devices per AP.

Forest Hills Public School District

Read more
https://res.cloudinary.com/ruckus-wireless/image/upload/ar_16:8,c_fill,g_auto,q_... Neumann University

Ruckus Provides Champion-Caliber Wired and Wireless Network

Neumann University

Read more
https://res.cloudinary.com/ruckus-wireless/image/upload/ar_16:8,c_fill,g_auto,q_... Sunway University

Sunway is a university located in Malaysia that serves 18,000 students and 1,500 staff members

Sunway University

Read more
Case Study

Cloudpath Enrollment System Supports Digital Campus

Blackpool and The Fylde College

Read more
Case Study

Embracing Bring-Your-Own-Device via Cloudpath Enrollment System

Fairfax County Public Schools

Read more
Case Study

Cloudpath Enabling Reliable, Secure Authentication Across Campus

Summit Public Schools

Read more
https://res.cloudinary.com/ruckus-wireless/image/upload/ar_16:8,c_fill,g_auto,q_...

Cloudpath Meets the Challenge at Worcester Polytechnic Institute

Worcester Polytechnic Institute

Read more
https://res.cloudinary.com/ruckus-wireless/image/upload/ar_16:8,c_fill,g_auto,q_... Victor Central School District

Victor, NY. 4,500 students. Replaces Aruba with Ruckus W-Fi for 1:1 learning and secure onboarding.

Victor Central School District

Read more

Webinars

Does Your Method for BYOD Onboarding Compromise Network Security?

Does Your Method for BYOD Onboarding Compromise Network Security?

On Demand

Senior Analyst and Practice Director Bob Laliberte from the Enterprise Strategy Group (ESG) discusses network access security as a risk area for data compromise. He points to security flaws in the usual methods for connecting BYOD, guest and IT-owned devices to the network and makes specific recommendations for how to address these issues.