Cloudpath Enrollment System

Secure Network Access for BYOD, Guest Users and IT-Owned Devices

Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired and wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network and secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access. It lets you deliver a great end-user experience and virtually eliminates helpdesk tickets related to network access. Choose from cloud-based or virtualized on-premises deployment. Cloudpath software supports any user, any device, and any network infrastructure.

Increase Security for Users, Devices, Data and the Network

Cloudpath software secures network connections with WPA-2 Enterprise—the gold standard in secure Wi-Fi. The system encrypts data in transit between the device and Wi-Fi access points for maximum security. Policy management gives you role-based access control, so that users see only what they should see. You gain visibility and control over what devices are on the network, and the power to revoke access at any time. A device posture check with remediation during onboarding ensures that only devices with appropriate security safeguards in place gain access.

Streamline Network Access for BYOD Users

The sheer volume and diversity of devices that require network access can cause headaches for IT departments. What if BYOD users could self-provision their devices with intuitive self-service workflows? With the simple onboarding portal in Cloudpath software, they can. Users get a great experience without IT intervention. BYOD users initially gain access with existing login credentials. The system installed a digital certificate on the device so that users authenticate seamlessly from that point forward—without having to re-enter a Wi-Fi password.

Give Visitors Easy, Self-service Guest Wi-Fi

No matter what the environment—schools, colleges, hotels, public venues, or anywhere, really—the first thing visitors ask is “How do I get on the Wi-Fi?” Cloudpath software delivers secure guest access for visitors without involving the IT helpdesk. Guest users simply self-register for internet access via an intuitive portal and receive login information via SMS, email, or printed voucher. You can customize the login portal, guest workflows, terms and conditions, and more for a trouble-free and secure user experience.

Certificate Authority Management
Improve network security by replacing unsecure approaches—passwords, pre-shared keys, MAC authentication—with certificates
Use multiple certificate sources including built-in Public Key Infrastructure (PKI), Microsoft CA and InCommon
Create a unique CA for each tenant, if you choose, in multi-tenant environments
Secure Access
Connect devices using the gold standard for security: WPA2-Enterprise via 802.1x authentication with EAP-TLS, PEAP access methods
Access Control
Push dynamic Access Control Lists (ACL) to wired or wireless infrastructure via RADIUS Vendor-Specific Attributes (VSA)
Perform automatic device posture check and remediation via dissolvable/temporary agent, ensuring that all devices seeking access meet minimum requirements
Self-Service Onboarding with Pre-Boarding
Empower end users to easily manage their own access and devices—and remove that burden from IT—with a customizable, self-service onboarding portal
Use “pre-boarding” to enable end users to onboard a device from anywhere the device can access the network—for example, allowing students to onboard their devices from home, before they arrive on campus
Simplify onboarding for all the devices in your environment—enterprise-owned, BYOD, guest and IoT
Policy Management
Implement granular per-user, per-device policies such as VLANs and application-based access to ensure a secure, high-performing network
Use Cloudpath software APIs to easily and automatically integrate with policy enforcement points such as switches, firewalls and content filters
Guest Access
Extend secure Wi-Fi to visitors of all varieties, onboarding guests onto WPA2-Enterprise wireless networks without IT lifting a finger
Implement a variety of traditional authentication and authorization options, including sponsorship and self-verification, as well as integration of secure Wi-Fi with external identity services, such as Google, Facebook and LinkedIn
Track guests across the network for security and compliance requirements and guest auditing
Reporting
Gain granular visibility into users and devices accessing the network, including when, how and for how long they access
Chromebook Integration
Distribute certificates to managed Chromebooks using the Google Admin Console
Simplify initial Chromebook setup with user-driven, IT-driven or distributor-driven approaches

No more Passwords! Hassle-Free Wi-Fi Access

On Demand

Learn how you can avoid angry tweets to the Chancellor about the hassle of password resets and lockouts in our upcoming live webinar. We will discuss how Ruckus Cloudpath software can rid your campus of password tyranny and provide remote secure onboarding to avoid move-in day help desk overload.

Securing Chromebook Classrooms Made Easy

On Demand

Only 52% of online edtech software require encryption of login and personal information. Luckily, Ruckus and Lightspeed can help you deploy your Chromebooks securely, so you can easily monitor and manage them in your classroom hassle-free. Watch our webinar to find out how.

The Swiss Army Knife for Lean IT to Secure Campus Networks

On Demand

Fast, reliable Wi-Fi and self-service BYOD access is our proven formula for success. Watch this webinar to learn how our Swiss Army Knife, Ruckus Cloudpath software, can help you provide remote secure onboarding to avoid move-in day help desk overload and rid your campus of password tyranny. 

Hassle-free Access: Passwords, Pre-Boarding & eduroam

On Demand

How many hours per week do you spend on password-related help desk tickets – especially from incoming freshman? Spare an hour, and listen to this webinar to learn how to rid your campus of password tyranny and simplify secure onboarding.

Simple & Secure Onboarding for BYOD

On Demand

Listen to Nick Wright, ICT Services Manager for Blackpool & The Fylde College, explain how implementing a secure network with increased capacity ​and a certificate-based security approach solved the challenges that were plaguing his IT staff.

How to Secure Every Device and Protect Your Network

On Demand

Learn how the combination of certificates and granular user and device policy management can improve or round out your security implementation—not just for employees but for guests and BYOD users, as well.

Integração de dispositivo segura e Cloudpath

Segurança e integração

O que significa:

Não estamos mais em 2005; não há nenhuma razão para que a integração de dispositivos sem fio não seja altamente segura e simples. O software Ruckus Cloudpath facilita a integração segura para empresas, órgãos governamentais e instituições educacionais.

Por que isso é importante:

Hotspots de WiFi público são uma excelente forma de melhorar a satisfação do visitante e do convidado. Eles têm a capacidade de manter as pessoas no local por mais tempo, geram lucros diretos e indiretos ou simplesmente oferecem uma experiência de local ou campus melhor. Mas na maioria das vezes, os hotspots públicos não oferecem nenhum tipo de proteção de segurança, nem mesmo criptografia. Cada vez mais usuários entendem os riscos de segurança inerentes aos hotspots desprotegidos e, portanto, são mais hesitantes em usá-los. Se eles optam por usar esses hotspots, é provável que seja somente para um conjunto limitado de atividades. Isso diminui o valor que motivou a implementação do WiFi público.

A integração segura usando o software Cloudpath permite que os convidados se conectem facilmente e com segurança a hotspots públicos. Os convidados fazem a integração uma vez e migram para qualquer hotspot configurado no mesmo consórcio de roaming. Depois que os convidados se associam à WLAN, eles são direcionados a um portal da Web, onde podem optar pelo acesso seguro ou aberto. Com a Ativação de Dispositivo Automatizada (ADE) patenteada, o dispositivo é protegido em segundos. Tudo isso contribui para conexões simplesmente melhores e experiências do usuário fantásticas.

Acesso de convidado seguro

Segurança e integração

O que significa:

O acesso de convidado seguro permite que os visitantes usem redes WiFi públicas sem comprometer a segurança para si mesmos ou para a rede.

Por que isso é importante:

Hotspots WiFi públicos são uma excelente forma de fazer com que as pessoas fiquem mais tempo em seu local e melhorar a satisfação do convidado. Mas na maioria das vezes, os hotspots públicos não oferecem nenhum tipo de proteção de segurança, nem mesmo criptografia. Cada vez mais usuários entendem os riscos de segurança inerentes aos hotspots desprotegidos e, portanto, são mais hesitantes em usá-los. Quando fazem isso, é provável que seja apenas para um conjunto limitado de atividades. Isso significa que, antes de mais nada, você não está recebendo todas as receitas diretas ou indiretas que motivaram a implantar o WiFi público.

A integração segura usando o software Cloudpath permite que os convidados se conectem facilmente e com segurança a hotspots públicos. Os convidados fazem a integração uma vez e migram para qualquer hotspot configurado no mesmo consórcio de roaming. Depois que os convidados se associam à WLAN, eles são direcionados a um portal da Web, onde podem optar pelo acesso seguro ou aberto. Com a Ativação de Dispositivo Automatizada (ADE) patenteada, o dispositivo é protegido em segundos.