Cloudpath

Security and Policy Management Platform

Cloudpath Enrollment System (ES) software is a security and policy management platform that enables any IT organization to protect the network by easily and definitively securing users and their wired and wireless devices—while freeing those users and IT itself from the tyranny of passwords.

Available cloud-managed or as a virtual instance and priced per user, Cloudpath software lets IT do with one system what usually requires many, while easily and automatically integrating with existing access and network security infrastructure.

Put passwords in your rear-view mirror

Cloudpath ES software includes a built-in, comprehensive Certificate Authority (CA) that enables any IT department to create and manage its own Public Key Infrastructure (PKI). With PKI, your organization is protected by the gold standard in wireless security: WPA-2 Enterprise via X.509 certificates. Passwords are just a memory.

Network access control: it's a must

Certificates are one part of the Cloudpath security equation. Policy-based access control is the other. Cloudpath ES software lets IT associate each device with a user; then establish fine-grained policies for both. The software works together with policy enforcement points to make unauthorized access and persistent bad behavior a thing of the past.

Now, about those BYOD devices

Just getting devices securely onto the network is half the battle for IT; BYOD adds more time and complexity. What if users—even bring your own device (BYOD) users—could self-onboard any and all of their devices? With the simple onboarding portal in Cloudpath ES, they can. IT can control the types of devices that are allowed access and ensure the requisite on-device enforcement, all while seeing a dramatic reduction in service and trouble tickets.

The missing link: guest access

You've secured owned and BYOD devices but what about guests and their devices? Cloudpath software includes comprehensive guest access functionality that secures guest devices just as easily and thoroughly as the rest, while providing abundant authentication options. And Cloudpath software is infrastructure-agnostic, so no matter the environment, you can treat all of your guests the same—or differently.

Certificate Authority Management
Certificates improve network security by replacing unsecure approaches: passwords, pre-shared keys and MAC authentication
Multiple certificate sources including built-in Public Key Infrastructure (PKI), Microsoft CA and InCommon
In multi-tenant mode, enables a unique CA for each tenant
Secure Access
Devices connect over secure WAP2-Enterprise via 802.1x authentication with EAP-TLS, PEAP access methods
Access Control
Push dynamic Access Control Lists (ACL) to wired or wireless infrastructure via RADIUS Vendor-Specific Attributes (VSA)
Perform automatic device posture check and remediation via dissolvable/temporary agent, ensuring that all devices seeking access meet minimum requirements
Self-service Onboarding with Pre-boarding
Customizable, self-service onboarding portal enables end users to easily manage their own access and devices, removing that burden from IT
Pre-boarding enables end users to onboard a device from anywhere the device can access the network
Supports enterprise-owned device onboarding, BYOD onboarding and guest device onboarding
Policy Management
Implement granular per-user, per-device policies such as VLANs and application-based access to ensure a secure, well-performing network
Via APIs, Cloudpath software easily and automatically integrates with policy enforcement points such as switches, firewalls and content filters
Guest Access
Extend secure Wi-Fi to visitors of all varieties, onboarding guests onto WPA2-Enterprise wireless networks without IT involvement
Implement a variety of traditional authentication and authorization options, including sponsorship and self-verification, as well as integration of secure Wi-Fi with external identity services, such as Google, Facebook, and LinkedIn
Track guests across the network for security and compliance demands and guest auditing
Reporting
Provides granular visibility into users and devices accessing the network, when they access, how they access and how long they access
Chromebook Integration
Distribute certificates to managed Chromebooks using the Google Admin Console
Enables initial Chromebooks setup via user-driven, IT-driven, or distributor-driven approaches

安全裝置裝載與 Cloudpath

安全性與裝載

說明:

現在不再是 2005 年了,裝載無線裝置應擁有高度安全性,並能夠輕鬆操作。Ruckus Cloudpath 軟體讓企業、政府機關及教育機構都能夠輕鬆進行安全裝載作業。

這項技術為何值得您注意:

隨著市場上數十億部無線裝置不斷推陳出新,數位環境儼然成為混亂的戰場。Cloudpath 可讓您自動快速同時裝載 IT 部門擁有的裝置以及 BYOD 裝置。Cloudpath 自 2006 年開發了自助 WiFi 裝載功能後,每年裝置裝載數達數百萬。該軟體透過標準型安全防護、強大加密及彈性政策控管功能,將企業級安全防護延伸至所有連線到公司網路的裝置。

安全來賓存取

安全性與裝載

說明:

安全來賓存取功能可讓訪客使用公用 WiFi 網路,而無須擔憂自己暴露在不安全的網路環境中。

這項技術為何值得您注意:

公用 WiFi 熱點提供絕佳管道,讓來訪賓客能夠長時間停留在您的場所,藉此改善顧客滿意度。但多數情況下,公用熱點並未提供任何安全防護,更別說是加密功能。越來越多使用者瞭解,未受保護的熱點可能帶來安全性風險,因此,他們會猶豫是否要使用網路。即便他們選擇使用網路,他們的網路活動也可能會受到各種限制。這就表示,您並未獲得任何直接或間接的收益,而這些收益正是促使您部署公用網路的原因。

透過 Cloudpath 軟體的安全裝載服務,賓客就能夠安全輕鬆地連線至公用熱點。賓客只須裝載一次,即可順暢地使用任何由相同漫遊服務聯盟設定的熱點。當賓客連上無線區域網路後,系統會將他們導向至品牌網路入口網站,讓賓客就能在其中選擇安全或開放式網路存取。透過專利的自動化裝置實踐 (ADE) 功能,該裝置即可在數秒內得到保護。