Best Network Access Control (NAC) Software in Brazil

Find and compare the best Network Access Control (NAC) software in Brazil in 2024

Use the comparison tool below to compare the top Network Access Control (NAC) software in Brazil on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    UTunnel VPN and ZTNA Reviews

    UTunnel VPN and ZTNA

    Secubytes

    $6/user/month
    102 Ratings
    See Software
    Learn More
    UTunnel VPN is a cost-effective, simple VPN server solution that secures network resources and business applications. It allows for fast deployment and easy management to On-Premise or Cloud VPN servers. This provides remote access to your workforce. UTunnel makes it easy to manage a private business network. It has centralized user and network management, as well as network monitoring. This allows for controlled access to business applications. It includes business-oriented features such as Single Sign-On (SSO), 2 Factor authentication(2FA), split routing and External DNS. UTunnel offers client applications for Android, iOS and macOS as well as Linux and Windows platforms. Features - Instant deployment - Centralized control Secure remote access - 256-bit encryption - OpenVPN/IKEV2 - Split Tunneling - One Sign-On - 2FA - Network Monitoring - Clean static IP - Custom DNS server - Custom Ports Manual configuration Expert tech-support
  • 2
    Device42 Reviews
    Top Pick

    Device42

    Device42

    $1499.00/year
    162 Ratings
    See Software
    Learn More
    Device42 is a robust and comprehensive data center and network management software designed by IT engineers to help them discover, document and manage Data Centers and overall IT. Device42 provides actionable insight into enterprise infrastructures. It clearly identifies hardware, software, services, and network interdependencies. It also features powerful visualizations and an easy-to-use user interface, webhooks and APIs. Device42 can help you plan for network changes and reduce MTTR in case of an unexpected outage. It provides everything you need for maintenance, audits and warranty, license certificate, warranty and lifecycle management, passwords/secrets and inventory, asset tracking and budgeting, building rooms and rack layouts... Device42 can integrate with your favorite IT management tools. This includes integration with SIEM, CM and ITSM; data mapping; and many more! You can try it free for 30 days!
  • 3
    Ivanti Policy Secure Reviews
    Pulse Policy Secure is a next-generation NAC that allows organizations to gain complete visibility and understand their security posture. It also enforces roles-based access and endpoint policy for network users, guests, and IoT devices. Pulse NAC can automate threat response to mitigate malware and unauthorized access.
  • 4
    ThreatLocker Reviews
    Top Pick
    For IT professionals to stop ransomware, you need to do more than look for threats. ThreatLocker helps you reduce your surface areas of attack with policy-driven endpoint security and change the paradigm from only blocking known threats, to blocking everything that is not explicitly allowed. Combined with Ringfencing and additional controls, you enhance your Zero Trust protection and block attacks that live off the land. Discover today the ThreatLocker suite of Zero Trust endpoint security solutions: Allowlisting, Ringfencing, Elevation Control, Storage Control, Network Access Control, Unified Audit, ThreatLocker Ops, Community, Configuration Manager and Health Center. 
  • 5
    S3M Security Network Access Control Reviews
    As more organizations adopt cloud-based services and remote work options, the need for NAC solutions has become increasingly important. With NAC in place, businesses can better control access to sensitive data, protect against cyber threats, and ensure compliance with industry regulations. NAC solutions also offer a number of benefits, including: Enhanced network security: NAC solutions help ensure that only authorized devices and users have access to the network, reducing the risk of cyber attacks and data breaches. Improved compliance: NAC solutions can help organizations meet regulatory requirements and industry standards by ensuring that all devices accessing the network meet specific security criteria. Increased visibility: NAC solutions provide organizations with greater visibility into their network, enabling them to monitor and manage devices, applications, and network traffic more effectively.
  • 6
    SAP Access Control Reviews
    Employees can access the services and applications they need without exposing their data or processes to unauthorized users. Governance software automates user provisioning, and certifies access to on-premise data and applications. This streamlines the process of validating and managing user access. You can also enforce governance through preventative policy checks and monitoring for emergency access. You can automatically identify and correct access risk violations across SAP and third party systems. Integrate compliance checks and mandatory risk mitigation in business processes. Allow users to submit workflow-driven, self-service access requests and approvals. With embedded risk analysis, identify and correct violations of segregation and critical access. Automate user access assignments across SAP systems and third-party applications. Maintain compliance roles using business-friendly terminology and terms.
  • 7
    Portnox Security Reviews
    Portnox is a Network Access Control (NAC) software vendor. NAC sits within the larger field of cybersecurity, and more specifically network security. It is a technology that enables organizations to enact its own unique policy for how and when endpoints (desktops, laptops, smartphones, etc.) can connect to their corporate networks. NAC is designed to allow IT security teams to gain visibility of each device trying to access its network, and specifically the type of device and access layer being used (i.e. wifi, wired ports, or VPN).
  • 8
    Barracuda CloudGen Firewall Reviews
    You can get comprehensive protection for both on-premises and multicloud deployments with the firewall built in or for the cloud. Advanced Threat Protection, which is cloud-hosted, detects and blocks advanced threats including zero-day attacks and ransomware attacks. With the help of a global threat network that is fed by millions data collection points, you can quickly protect yourself against the latest threats. Modern cyber threats like ransomware, advanced persistent threats, targeted attack, and zero-day threat require sophisticated defense techniques that combine accurate threat detection with quick response times. Barracuda CloudGen Firewall provides a comprehensive suite of next-generation firewall technologies that provide real-time protection against a wide range of network threats, vulnerabilities and exploits. This includes SQL injections and cross-site scripting, denial-of-service attacks, trojans and viruses, worms and spyware.
  • 9
    Forescout Reviews

    Forescout

    Forescout Technologies

    1 Rating
    It all seemed to happen in a matter of hours. Your organization became an Enterprise of Things (EoT). PCs, mobile devices and cloud workloads. Agentless IoT devices and OT devices. Device diversity is good for security, but it comes at the expense of security. Your users can connect from anywhere in the world. The truth is that every thing that touches your enterprise exposes it to risk. It is essential to see it and protect it. Forescout is a great place to start. We are the only company that actively defends Enterprise of Things at Scale.
  • 10
    N‑able N-sight RMM Reviews
    N‑able N-sight RMM, a cloud-based IT solution, makes it possible for MSPs deliver valuable technology services in hours instead of weeks or months. Clear, graphical dashboards put alerts front-and-center so you can concentrate on what matters most. Remote access and security features are built-in to help you support and protect your business from the beginning. You can also add security layers to your business and add-on services when you are ready. Remote access, network path visualization and automated monitoring and maintenance are some of the N-able RMM's features. N‑able N-sight RMM can also be downloaded as Android and iOS mobile applications to allow users to manage problems from anywhere.
  • 11
    SolarWinds Access Rights Manager Reviews
    SolarWinds®, Access Rights Manager is designed for IT and security administrators to quickly and easily provision, deprovision, manage, audit, audit, and audit user access rights to files, systems, and data. This allows them to help protect their organizations against the potential risks of data theft or breaches. Analyzing user authorizations and access permissions will give you a visual representation of who has access to what and when. To demonstrate compliance with many regulatory requirements, customized reports can be created. Provision and deprovision users can be done using role-specific templates. This will ensure compliance with security policies and access privilege delegation.
  • 12
    Start Hotspot Reviews

    Start Hotspot

    Start Hotspot

    $48 /Year /AP
    3 Ratings
    Start Hotspot Cloud WiFi platform allows you to build your WiFi and scale with you. Connect routers, customize splash pages and limit Internet access. Engage social WiFi users. Accept credit card payments. Check statistics and analytic. Hosted by us and managed by you from any device. Engage WiFi users using video or image ads. For high conversion rates and best engagement, location-based video ads are the best. Innovative WiFi marketing strategies can take your user experience to the next level. Send targeted Email campaigns. Promoting brands and monetizing by offering video ads for access. Display coupons or the latest promotion to be used at a retail store. Offer discounts to your customers and invite them to take a survey or get more information. Advertise and engage potential customers with the right promotional message.
  • 13
    SafeConnect NAC Reviews
    SafeConnect NAC's value is simple: By ensuring that every connected device can be seen, checked for compliance in real time, and respectively blocked, or allowed in reality, security incidents can be greatly reduced. You don't want to expose your organization's data or reputation. Instead, ensure that your network's security, as well as the privacy of your constituents, and your intellectual property, are maintained.
  • 14
    Genian NAC Reviews

    Genian NAC

    GENIANS

    $0.2 to 1 per Active Device
    Genians is a cybersecurity platform that provides full network surveillance for all connected devices. It also provides dynamic access control to ensure compliance with IT security policies. It then uses automation to orchestrate the entire security portfolio of an organization, in concert with Device Platform Intelligence (NAC), Endpoint Detection and Response(EDR), and Network Access Control (NAC) to create a highly-secure network edge. Genians ZNetwork Access Control can protect every connecting point in a variety of networking environments, such as VPN, xDSL and 5G. It also ensures least-privilege, multifactor authentication (MFA), micro-segmentation, and least-privilege. It can also be used to enhance any enterprise's Secure Access Service Edge architecture (SASE). Genians provides millions of endpoints for organizations of all sizes and industries. This includes global Fortune 500 companies, government, military, energy, finance and education.
  • 15
    TekRADIUS Reviews

    TekRADIUS

    KaplanSoft

    $239
    TekRADIUS for Windows is a RADIUS Server with a built-in DHCP Server. TekRADIUS has been tested on Microsoft Windows Vista and Windows 7-11 servers. TekRADIUS complies to RFC 2865 and RFC2866. TekRADIUS supports TCP (RFC 6613), and TLS (RFC 6614 - RadSec). TekRADIUS comes in three editions: TekRADIUS LT, which supports SQLite, and TekRADIUS OD, which supports MySQL, MariaDB and PostgreSQL databases via ODBC. It runs as a Windows Service, and comes with an interface for Windows management.
  • 16
    UserLock Reviews

    UserLock

    IS Decisions

    $2.00/month/user
    UserLock | Two Factor Authentication & Access Management for Windows Active Directory
  • 17
    Cruz Operations Center (CruzOC) Reviews
    CruzOC is a multi-vendor, scalable network management and IT operations tool that provides robust but easy-to-use netops. CruzOC's integrated, automated management features include performance monitoring, configuration management, lifecycle management, and lifecycle management of 1000s of vendors. Administrators can use CruzOC to automate their data center operations and critical resources. This will improve network and service quality, speed up network deployments and lower operating expenses. The result is comprehensive and automated problem resolution from a single-pane-of-glass. Cruz Monitoring & Management. Monitoring & Analytics, NMS -- health, NPM traffic, log, and change. Automation & configuration management -- compliance and security -- orchestration, provisioning. Automated deployment -- auto-deploy, ZTP, remote deploy. Deployments are available both on-premises and in the cloud.
  • 18
    NordLayer Reviews

    NordLayer

    NordLayer

    $8 per user per month
    Network access security that scales with your business — NordLayer secures your organization’s traffic and data to provide your colleagues with safe, reliable, remote access.
  • 19
    Lumen Cloud Reviews
    Our flexible cloud solutions, previously known as CenturyLink Cloud, allow you to create, manage and scale apps quickly. You can get powerful, hybrid-ready services that provide the governance, automation, and advanced features you need to propel your business. Our secure platform can unify everything you need, whether elastic infrastructure, cloud-native app services, orchestration, or managed solutions.
  • 20
    ExtremeCloud IQ Reviews

    ExtremeCloud IQ

    Extreme Networks

    ExtremeCloud™, IQ - A new breed of cloud management. Streamline wired network operations and unlock machine learning-powered IT and business insights. Extreme Networks invented cloud network management and designed the ExtremeCloud™, an IQ network management system for the cloud. The result is a next-generation platform for wireless network networking that dramatically reduces operational complexity as well as costs for our customers and partners. ExtremeCloudIQ dramatically simplifies the unified management of wired access networks and Wi-Fi networks. It combines streamlined configuration workflows with real-time client monitoring, simplified troubleshooting, flexible RF planner tools and API integration.
  • 21
    Lan-Secure Switch Protector Reviews

    Lan-Secure Switch Protector

    Lan-Secure

    $99 per 10 devices
    Switch Protector is an add-on engine to Switch Center software. It implements IEEE-802.1X features onto managed network switch ports. This helps protect networks from potential intruders and unauthorized connections as well as malicious activities within the organization. The network access control (NAC), monitoring software, is a powerful security tool that combines a variety access protection rules to detect and prevent intrusions. The real-time protection monitor allows detection of new network connections and network changes, including suspicious network activity. Software built-in protection rules allow you to enforce any network security policy by allowing proactive access control over network nodes that have violated the chosen security protection rules. The protection engine can also be controlled via the built-in administration interface, or by intranet web to manage access permissions for authorized network nodes.
  • 22
    Auconet BICS Reviews
    You can strengthen your ITOM solutions by leveraging the synergistic Auconet-BICS capabilities. Auconet's BICS (Business Infrastructure Control Solution) provides next-generation IT operations management, security and control through a single pane. BICS centrally manages, secures and manages every network device, port and endpoint in complex IT or SCADA infrastructures that have more than a million endpoints. Auconet BICS allows global enterprises to seamlessly solve today's mobile device utilization problems and BYOD issues, as well as tomorrow's challenges using Internet of Everything non-traditional devices. Auconet BICS was designed for the enterprise and has been proven reliable by long-term installations. It is trusted by top-tier Global 1000 companies like BASF, Siemens and Deutsche Bahn as well as hundreds more financial institutions. Auconet BICS offers a new, efficient way to manage complex networks.
  • 23
    FortiNAC Reviews
    Organizations must improve their visibility into the contents of their networks due to the proliferation of Internet of Things devices. They must know every device and user that access their networks. IoT devices allow digital transformation initiatives and increase efficiency, flexibility, optimization. They are not trustworthy because they prioritize security over cost. FortiNAC gives you network visibility, allowing you to see all devices and users connected to your network. You can also control these devices and users with dynamic, automated responses.
  • 24
    Trellix Intrusion Prevention System Reviews
    Signature-based and signatureless intrusion prevention systems can stop new and unknown attacks. Signature-less intrusion detection detects malicious network traffic and stops attacks that do not have signatures. To scale security and adapt to changing IT dynamics, network virtualization can be supported across private and public clouds. You can increase hardware performance up to 100 Gbps, and use data from multiple products. Discover and eliminate stealthy botnets, Trojans, and reconnaissance attacks hidden across the network landscape. To correlate unusual network behavior, collect flow data from routers and switches. Advanced threats can be detected and blocked on-premises, in virtual environments and software-defined data centres, as well as private and public clouds. You can gain east-west network visibility, and threat protection through virtualized infrastructure and data centres.
  • 25
    R81.10 Reviews

    R81.10

    Check Point Software Technologies

    R81.10 is the industry’s most advanced threat prevention software. It delivers uncompromising simplicity and consolidation throughout the enterprise. R81.10 automates the prevention process and makes managing cyber security easier than ever. R81.10 allows enterprises to be at their best, whether it's deploying the latest security technologies and security to protect the company or crafting security policies. Based on traffic patterns, automatically allocate hardware and core resources. Provide greater security and performance. Check Point now offers a comprehensive security management architecture that can be used from the cloud. It is designed to manage security across all on-premise firewalls, networks and cloud, mobile, IoT, and cloud. A dynamic security compliance solution that monitors and enhances security in your Check Point environment will help you increase your security.
  • Previous
  • You're on page 1
  • 2
  • Next