UNACΒΆ

The Identity is the perimeter

Guarantee that identity and entitlements of users and devices/things are the first line of defense against advanced threats.

Simplify network control of assets in wired, wireless , VPNs and APPs

../../_images/unac_intro.png

POLICY DECISION & ENFOREMENT POINT

Define and enforce policies (block, allow, limit) based on device/things, user and business critical nature of the asset

TOTAL INTEROPERABILITY AGNOSTICS

Enforce complete control in a multivendor network infrastructure using multiple protocols

TOTAL INTEGRATION / ADAPATION

Adaptive authentication and authorization via an IAM* holistic vision; share / gathered data, connectivity by API

AUDIT TRAILS

Via security orchestration and data / logs enables forensic trails