fbpx

NAC
Network Access Control

NAC (Network Access Control) is a solution for organizational networks that aims to ensure that only authorized computers/devices inside and outside the organization will be able to communicate with each other, while all others, which are not authorized, will be blocked and won’t be able to communicate.

Cyber 2.0’s NAC is based on a Mathematical Chaos Engine, which creates a form of Chaos Balance among the authorized computers. Actually, it scrambles outgoing traffic from authorized computers and descrambles it on the computers it enters

On the other hand, it does not scramble outgoing traffic from unauthorized computers, and again, descrambles it on the computers it enters. Therefore, any unauthorized computer will not be able to communicate within the network, simply because it will not be conceived as such by the protected computers

Any unauthorized /unknown device that tries to gain access to the network (with any level of privileges) will be blocked automatically

Cyber 2.0’s NAC advantages over competitors:

  • Does not require external hardware (other than a management server), unlike others that require replacement of the organizational network. Therefore, it mainly saves money, but it also saves management and operational attention, Troubleshooting and more
  • Does not require port authentication or complex evaluations. Installation is simple and easy
  • Also provides inventory capabilities, and gives full details of all network activities
  • Allows deployment through the cloud

Cyber 2.0’s NAC technology has proven itself:

  • Cyber 2.0 is the only company that is ready to put its system to the test every year , when all the hackers in the world repeatedly try to communicate with the computers on the network
  • The idea behind the challenge is simple: hackers simulate computers gaining direct access to the network, with the only difference between them and the network computers being that Cyber 2.0 software is not installed on their computers
  • None of the thousands of hackers who have tried so far were able to communicate with the organization’s computers, even though they were defined as part of the organizational network