Compare Editions

NAC 6.0 is available in three editions: Basic, Professional, and Enterprise.

Basic

Provides visibility into network and IT assets.

Professional

Provides network access control according to IT security policy.

Enterprise

Provides advanced and automated IT security.

Your deployment can be built and upgraded step by step using each edition,
making it easier to build gradually with less cost.
Please refer to the function comparison table for each edition below to select
the product that suits you.

Category

Feature

Basic

Professional

Enterprise

Visibility

Detect/Monitor IP-enabled Device

Yes

Yes

Yes

Device Platform Intelligence (Name, Type, Picture, EOL, Connection, CVE)

Yes

Yes

Yes

Switch Port Information

Yes

Yes

Yes

WLAN Monitoring / Security (Rogue/Misconfigured AP)

Yes

Yes

Yes

Basic Endpoint Information (OS, HW, Software) by Windows/macOS Agent

Yes

Yes

Yes

Condition based Dynamic Node Group

Yes

Yes

Yes

Customizable Dashboards (Over 100 Widgets)

Yes

Yes

Yes

Track Changes / Audit Logs

Yes

Yes

Yes

Network Anomaly Detection (MAC Spoofing, Rogue Gateway, Ad-hoc)

Yes

Yes

Yes

Basic Reports (Node, WLAN, Log)

Yes

Yes

Yes

Notification (Email/Text Message)

Yes

Yes

Yes

Custom Reports

Yes

Yes

Detect OSS usage and provide SBOM details for better software transparency

Yes

Yes

Classify endpoints based on threat scores

Yes

Yes

User Authentication

Captive Portal Login (Web login)

Yes

Yes

Google Authenticator Support for Captive Web Portal

Yes

Yes

Active Directory SSO

Agent Based

Agentless

External User Directory Integration (LDAP/RADIUS/SMTP/POP3/IMAP/SAML2)

Yes

FIDO (Biometric) authentication for administrator, Captive Web Portal and Agent

Yes

Multifactor Authentication (Text Message/Email/Google OTP)

Admin Only

Yes

Hardware security chip TPM EK-based device authentication

Yes

Network Access Control

802.1X based Control (RADIUS Server, EAP, MAB, VLAN Assign, CoA)

Yes

Yes

ARP based Layer 2 Enforcement

Yes

Yes

Port Mirroring (SPAN) based Enforcement

Yes

Yes

In-line Enforcement (Dual-homed Gateway)

Yes

Yes

Switch integration (SNMP) based Enforcement

Yes

Yes

DHCP based Enforcement (DHCP Server)

Yes

Yes

Role based Access Control

Yes

Yes

IP Address Management(IPAM)

Yes

Yes

Tag-Based Control of Users, Wlans and Devices/Nodes (E.g., Guest devices, temporary privileges, policy exemptions)

Yes

Yes

Cloud Security

Cloud Workload Visibility

Yes

Policy server operation in the cloud

Yes

Automated Cloud Control using CLI Interface

Yes

Cloud Security Group Management

Yes

Desktop Management

Compliance Check (Antivirus, OS Update, Required SW, OS Settings)

Yes

Yes

OS Configuration (Screenlock, Internet Options, DNS)

Yes

Windows Update Management (Offline Update, Update Cache, Approval)

Yes

External Device Control (USB and etc.)

Yes

802.1X Connection Profile Provisioning (Wireless/Wired)

Yes

EAP-GTC Plugin for Windows (Support Regacy Password Authentication)

Yes

WLAN Control (SSID Whitelist, SoftAP block)

Yes

Integration

User Directory Sync (RDBMS, Active Directory, LDAP, Google)

Yes

Webhook / Syslog / SNMP trap (Outbound)

Yes

REST API (Inbound)

Yes

Syslog Server (Inbound)

Yes

Business Process

User Consent Pages

Yes

Request/Approval via CWP (IP, Device, User, Guest User, External Device)

Yes

Role based Administrator

Yes

Custom Fields (Node, Device, User)

Yes

Custom Captive Portal Pages

Yes

Multilingual Support

Yes

Streamline repetitive tasks using workflow templates

Yes

Scalability and Availability

High Availability (Policy Server / Network Sensor)

Yes

Interface Channel Bonding

Yes

Disaster Recovery (DB Replication, Redundant Policy Server)

Yes