Connectivity Security

IoT and IIoT Devices – Secure provisioning and authentication

  •         ​Authentication of​ ​any​ ​Wi-Fi​ ​enabled​ ​device​ ​securely​ ​and​ ​legally,​ ​​checking that items​ ​are comprehensively​ ​authorised​ ​for​ ​network​ ​use​ ​and​ ​prescribing​ ​terms​ ​of​ ​use
     
  • Centrally-managed​ ​RADIUS-based​ ​MAC​ ​authentication​ ​platform​ ​/​ ​​Inbuilt​ ​profiling service​ ​to live​ ​audit​ ​and​ ​classify​ ​‘traditional’​ ​devices​ ​(smartphones,​ ​tablets,​ ​etc.), plus​ ​IoT​ ​and​ ​other headless​ ​devices,​ ​such​ ​as​ ​IP​ ​cameras,​ ​phones​ ​and​ ​printers
     
  • Authentication​ ​and​ ​​authorisation​​ ​via​ ​multiple​ ​​sources​ ​(AD,​ ​LDAP,​ ​SQL​ ​dB)
     
  • Data​ ​security​ ​via​ ​the​ ​latest​ ​carrier-grade​ ​encryption
     
  • Proven​ ​to​ ​work​ ​at​ ​scale​ ​-​ ​supporting​ ​billions​ ​of​ ​secure​ ​authentications​ ​a​ ​year

IoT and IIoT Devices – Policy​ ​management​ ​to​ ​maintain​ ​quality​ ​and​ ​security 

  • Set​ ​tiered​ ​usage​ ​policies,​ ​access​ ​restrictions​ ​and​ ​manage​ ​devices​ ​from​ ​a​ ​single,​ ​simple interface,​ ​to​ ​handle​ ​different​ ​protocols,​ ​identity​ ​and​ ​communication​ ​security​ ​concerns
     
  • Intuitive​ ​policy​ ​configuration​ ​templates​ ​and​ ​visibility​ ​troubleshooting​ ​tools
     
  • Inbuilt,​ ​context-based​ ​policy​ ​engine,​ ​RADIUS,​ ​TACACS+​ ​protocol​ ​support,​ ​device​ ​profiling​ ​and comprehensive​ ​posture​ ​assessment​ ​options
     
  • Define​ ​specific,​ ​secure​ ​network​ ​access​ ​enforcement​ ​policies​ ​by​ ​user​ ​roles,​ ​device​ ​types, authentication​ ​method,​ ​EMM/MDM​ ​attributes,​ ​device​ ​health,​ ​location​ ​and​ ​time-of-day
     
  • Prioritise​ ​important​ ​user​ ​network​ ​traffic​ ​to​ ​prevent​ ​Wi-Fi​ ​service​ ​risks
     
  • Terminate​ ​device​ ​access​ ​to​ ​the​ ​network,​ ​and​ ​apply​ ​bandwidth​ ​policies
     
  • Automate​ ​previously​ ​manual​ ​processes​ ​like​ ​threat​ ​protection​ ​and​ ​workflows

 

  • Set​ ​tiered​ ​usage​ ​policies,​ ​access​ ​restrictions​ ​and​ ​manage​ ​devices​ ​from​ ​a​ ​single,​ ​simple interface,​ ​to​ ​handle​ ​different​ ​protocols,​ ​identity​ ​and​ ​communication​ ​security​ ​concerns
     
  • Intuitive​ ​policy​ ​configuration​ ​templates​ ​and​ ​visibility​ ​troubleshooting​ ​tools
     
  • Inbuilt,​ ​context-based​ ​policy​ ​engine,​ ​RADIUS,​ ​TACACS+​ ​protocol​ ​support,​ ​device​ ​profiling​ ​and comprehensive​ ​posture​ ​assessment​ ​options
     
  • Define​ ​specific,​ ​secure​ ​network​ ​access​ ​enforcement​ ​policies​ ​by​ ​user​ ​roles,​ ​device​ ​types, authentication​ ​method,​ ​EMM/MDM​ ​attributes,​ ​device​ ​health,​ ​location​ ​and​ ​time-of-day
     
  • Prioritise​ ​important​ ​user​ ​network​ ​traffic​ ​to​ ​prevent​ ​Wi-Fi​ ​service​ ​risks
     
  • Terminate​ ​device​ ​access​ ​to​ ​the​ ​network,​ ​and​ ​apply​ ​bandwidth​ ​policies
     
  • Automate​ ​previously​ ​manual​ ​processes​ ​like​ ​threat​ ​protection​ ​and​ ​workflows

 

IoT and IIoT Devices - Traffic​ ​analysis​ ​for​ ​network​ ​monitoring,​ ​measurement​ ​and​ ​alerts 

  • An​ ​early​ ​warning​ ​system,​ ​providing​ ​alerts​ ​to​ ​unauthorised​ ​activity​ ​like​ ​sudden​ ​traffic​ ​spikes, allowing​ ​​administrators to​ ​take​ ​​protective​ ​measures
     
  • Customisable​ ​reporting​ ​​via​ ​a​ ​simple,​ ​accessible,​ ​dashboard
     
  • BYOD control and reporting

 

Print Print | Sitemap
© Saamsol Ltd