Cloudpath

Security and Policy Management Platform

Cloudpath Enrollment System (ES) software is a security and policy management platform that enables any IT organization to protect the network by easily and definitively securing users and their wired and wireless devices—while freeing those users and IT itself from the tyranny of passwords.

Available cloud-managed or as a virtual instance and priced per user, Cloudpath software lets IT do with one system what usually requires many, while easily and automatically integrating with existing access and network security infrastructure.

Put passwords in your rear-view mirror
Cloudpath ES software includes a built-in, comprehensive Certificate Authority (CA) that enables any IT department to create and manage its own Public Key Infrastructure (PKI). With PKI, your organization is protected by the gold standard in wireless security: WPA-2 Enterprise via X.509 certificates. Passwords are just a memory.

Network access control: it's a must
Certificates are one part of the Cloudpath security equation. Policy-based access control is the other. Cloudpath ES software lets IT associate each device with a user; then establish fine-grained policies for both. The software works together with policy enforcement points to make unauthorized access and persistent bad behavior a thing of the past.

Now, about those BYOD devices
Just getting devices securely onto the network is half the battle for IT; BYOD adds more time and complexity. What if users—even bring your own device (BYOD) users—could self-onboard any and all of their devices? With the simple onboarding portal in Cloudpath ES, they can. IT can control the types of devices that are allowed access and ensure the requisite on-device enforcement, all while seeing a dramatic reduction in service and trouble tickets.

The missing link: guest access
You've secured owned and BYOD devices but what about guests and their devices? Cloudpath software includes comprehensive guess access functionality that secures guest devices just as easily and thoroughly as the rest, while providing abundant authentication options. And Cloudpath software is infrastructure-agnostic, so no matter the environment, you can treat all of your guests the same—or differently.

Certificate Authority Management
Certificates improve network security by replacing unsecure approaches: passwords, pre-shared keys and MAC authentication
Multiple certificate sources including built-in Public Key Infrastructure (PKI), Microsoft CA and InCommon
In multi-tenant mode, enables a unique CA for each tenant
Secure Access
Devices connect over secure WAP2-Enterprise via 802.1x authentication with EAP-TLS, PEAP access methods
Access Control
Push dynamic Access Control Lists (ACL) to wired or wireless infrastructure via RADIUS Vendor-Specific Attributes (VSA)
Perform automatic device posture check and remediation via dissolvable/temporary agent, ensuring that all devices seeking access meet minimum requirements
Self-service Onboarding with Pre-boarding
Customizable, self-service onboarding portal enables end users to easily manage their own access and devices, removing that burden from IT
Pre-boarding enables end users to onboard a device from anywhere the device can access the network
Supports enterprise-owned device onboarding, BYOD onboarding and guest device onboarding
Policy Management
Implement granular per-user, per-device policies such as VLANs and application-based access to ensure a secure, well-performing network
Via APIs, Cloudpath software easily and automatically integrates with policy enforcement points such as switches, firewalls and content filters
Guest Access
Extend secure Wi-Fi to visitors of all varieties, onboarding guests onto WPA2-Enterprise wireless networks without IT involvement
Implement a variety of traditional authentication and authorization options, including sponsorship and self-verification, as well as integration of secure Wi-Fi with external identity services, such as Google, Facebook, and LinkedIn
Track guests across the network for security and compliance demands and guest auditing
Reporting
Provides granular visibility into users and devices accessing the network, when they access, how they access and how long they access
Chromebook Integration
Distribute certificates to managed Chromebooks using the Google Admin Console
Enables initial Chromebooks setup via user-driven, IT-driven, or distributor-driven approaches

Integração de dispositivo segura e Cloudpath

Segurança e integração

O que significa:

Não estamos mais em 2005; não há nenhuma razão para que a integração de dispositivos sem fio não seja altamente segura e simples. O software Ruckus Cloudpath facilita a integração segura para empresas, órgãos governamentais e instituições educacionais.

Por que isso é importante:

Com bilhões de dispositivos sem fio e novos dispositivos chegando ao mercado a todo momento, podemos nos sentir no Velho Oeste. O Cloudpath permite integrar tanto dispositivos de propriedade do departamento de TI quanto dispositivos BYOD de modo rápido e automatizado. O Cloudpath inventou a integração de WiFi de autoatendimento em 2006 e integra milhões de dispositivos todo ano. Ele usa segurança baseada em padrões, criptografia forte e controles de política flexíveis para estender a segurança empresarial a cada dispositivo que entra na rede.

Acesso de convidado seguro

Segurança e integração

O que significa:

O acesso de convidado seguro permite que os visitantes usem redes WiFi públicas sem comprometer a segurança para si mesmos ou para a rede.

Por que isso é importante:

Hotspots WiFi públicos são uma excelente forma de fazer com que as pessoas fiquem mais tempo em seu local e melhorar a satisfação do convidado. Mas na maioria das vezes, os hotspots públicos não oferecem nenhum tipo de proteção de segurança, nem mesmo criptografia. Cada vez mais usuários entendem os riscos de segurança inerentes aos hotspots desprotegidos e, portanto, são mais hesitantes em usá-los. Quando fazem isso, é provável que seja apenas para um conjunto limitado de atividades. Isso significa que, antes de mais nada, você não está recebendo todas as receitas diretas ou indiretas que motivaram a implantar o WiFi público.

A integração segura usando o software Cloudpath permite que os convidados se conectem facilmente e com segurança a hotspots públicos. Os convidados fazem a integração uma vez e migram para qualquer hotspot configurado no mesmo consórcio de roaming. Depois que os convidados se associam à WLAN, eles são direcionados a um portal da Web, onde podem optar pelo acesso seguro ou aberto. Com a Ativação de Dispositivo Automatizada (ADE) patenteada, o dispositivo é protegido em segundos.