FEATURES

Easy to Use

With its easy-to-use interface, you can quickly and easily perform all operations via the panel! It’s not as complex as other NAC products.

No Radius

You can quickly secure your network without needing to configure additional Radius on the network devices in your corporate network.

No Agent

With the advanced reporting system, you can quickly and easily access detailed information about your corporate network! You can receive automatic reports with the scheduled reporting feature.

Policies

You can easily assign VLANs based on MAC addresses, Anti-virus programs, Windows versions, and programs installed on end-user devices!

Advanced Reporting System

With the advanced reporting system, you can quickly and easily access detailed information about your corporate network! You can receive automatic reports with the scheduled reporting feature.

OU Assignments

With Active Directory integration, you can easily make VLAN assignments specific to OU (Organizational Unit)! You can make VLAN assignments based on switch or floor without using OU structure.

With the native NAC product SureNAC

✔ Effortlessly perform numerous operations on the ports.

    • Observe the real-time status of the port (Active connection, Closed, Unverified Connection, etc.).
    • Swiftly alter the VLAN of the port.
    • Instantly disable and re-enable port access.
    • Exclude the port from NAC control and retrieve it.
    • Examine the detailed history of the port.
    • View end-user devices on the port and display device details.

✔ Effortlessly examine the details of end-user devices.

    • Access detailed information about end-user devices.
        • Device brand, model, operating system, operating system version.
        • Device processor, RAM (Memory) amount, Disk space (Total space, Free space), and attached monitors.
        • List of Network Adapters on the device.
    • Ascertain the last network device and port the end-user was connected to.
    • Learn the end-user’s current VLAN, MAC address, and IP address.
    • Examine the programs installed on the device and assign VLAN based on these through writing access rules on NAC.
    • Inspect the applications running on the device and assign VLAN based on these through writing access rules on NAC.
    • Review the services running on the device and assign VLAN based on these through writing access rules on NAC.

✔ Maintain network security at its peak with policies.

    • With the advanced MAC address policy, you can set specific security options for devices connecting to your corporate network.
    • Determine security policies based on the status of the Anti-Virus service found on the end-user device.
    • Establish a specific policy for end-user devices that fall below the Windows version you specify.
    • Determine security policies based on the programs installed on end-user devices.

✔ SureNAC keeps a record of erroneous access or situations that contradict the policies you set. On the error log page, you can instantly learn which VLAN the end-users have moved to and which policy they have encountered.

✔ SureNAC offers a new network security protocol called CADP (Client based Anomaly Detection Protocol) to detect ports that could cause security vulnerabilities and anomalies in clients. This way, you can become aware of situations that could cause security vulnerabilities in clients.

✔ With SureNAC, you can analyze network security from end to end using innovative features such as anomaly detection, high reliability, no need for agent software, and sensitivity to lateral movements in the network. Additionally, you can easily integrate with network devices from different manufacturers.

✔ You can obtain the desired information from clients without needing to install any agent software on computers.

✔ SureNAC eliminates dependency on the Radius server. Also, Radius server-based network access control is offered as an option.

✔ Thanks to the network discovery feature offered by the SureNAC product, you can dynamically track all changes in the network by mapping out the existing network topology.

✔ With its advanced reporting system, you can instantly examine all events that occurred on your corporate network between the dates you specify and generate reports. You can enable time-based automatic report generation and email delivery through the SureNAC web interface.

Zero Trust, Full Security!

SureNAC operates on a “Zero Trust” policy, holding end-user devices in a buffer zone and granting network access only after necessary checks are performed.

It is a solution capable of working with all brands and models of network devices, independent of the manufacturer, to prevent unauthorized and unpermitted devices from joining your corporate network.

Developed in our country using entirely local/national resources, it has benefited from the TÜBİTAK-TEYDEB Support Program and was developed by Rakort Information and Communication Technologies Ltd. However, all responsibility related to the product belongs to Rakort Information and Communication Technologies Ltd.