■ PIXIS AtheNAC Feature
- Simple and smooth operation status and environment information presentation with optimized dynamic charts.
- Provides a complete zero-trust framework that supports the integration of GCB/VANS, MFA/FIDO, asset management, and other services of various brands.
- Hybrid NAC technology uses the most stringent 802.1x and ARP spoofing technology to ensure tight and reliable internal network security.
- It provides a custom report function. In addition to more than 80 built-in templates, you can also customize the report based on the template or write SQL syntax to generate reports that comply with information security regulations and audit requirements.
- Integrates the world's largest IoT database and object recognition engine to provide the most complete and accurate device identification.
- Flexible visitor authentication service allows you to easily manage visitor access applications, information security checks, usage records, etc. You can also limit network access to specific time periods.
- The quarantine policy implements a pre-check of equipment compliance, especially the patented "quarantine area function", to completely block threats from abroad.
- The distributed architecture is deployed in an out-of-band without affecting the customer environment, so even if a product fails, it will not affect network operations.
■ PIXIS AtheNAC Functionality
- NAC, IPAM: abnormal status dashboard, unknown devices (non-compliant device management, blocking, device compliance check), network anomaly management, DHCP IP distribution, etc.
- Internet of Things (IoT) device identification: Provides IoT device identification dashboard, brand identification, and management.
- Visitor management system: visitor statistics dashboard, pre-application mechanism, device compliance check, and device access track.
- Open API: Use SQL/Restful API/WMI to quickly integrate with third-party services, such as WSUS, GCB, VANS.
- Through API, third-party services can be quickly integrated with NAC, such as the configuration statistics dashboard, vulnerability notification statistics dashboard, device connection records, and configuration policy application statistics.
- Visualized network topology diagram: Automatically generate an architecture diagram based on the actual environment, and present the traffic status between the network switches and indirect devices.
CYBERSEC 2025 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy 。