Compare Editions
NAC 6.0 is available in three editions: Basic, Professional, and Enterprise.
- Basic
Provides visibility into network and IT assets.
- Professional
Provides network access control according to IT security policy.
- Enterprise
Provides advanced and automated IT security.
Category |
Feature |
Basic |
Professional |
Enterprise |
|---|---|---|---|---|
Visibility |
Detect/Monitor IP-enabled Device |
Yes |
Yes |
Yes |
Device Platform Intelligence (Name, Type, Picture, EOL, Connection, CVE) |
Yes |
Yes |
Yes |
|
Switch Port Information |
Yes |
Yes |
Yes |
|
WLAN Monitoring / Security (Rogue/Misconfigured AP) |
Yes |
Yes |
Yes |
|
Basic Endpoint Information (OS, HW, Software) by Windows/macOS Agent |
Yes |
Yes |
Yes |
|
Condition based Dynamic Node Group |
Yes |
Yes |
Yes |
|
Customizable Dashboards (Over 100 Widgets) |
Yes |
Yes |
Yes |
|
Track Changes / Audit Logs |
Yes |
Yes |
Yes |
|
Network Anomaly Detection (MAC Spoofing, Rogue Gateway, Ad-hoc) |
Yes |
Yes |
Yes |
|
Basic Reports (Node, WLAN, Log) |
Yes |
Yes |
Yes |
|
Notification (Email/Text Message) |
Yes |
Yes |
Yes |
|
Custom Reports |
Yes |
Yes |
||
Detect OSS usage and provide SBOM details for better software transparency |
Yes |
Yes |
||
Classify endpoints based on threat scores |
Yes |
Yes |
||
User Authentication |
Captive Portal Login (Web login) |
Yes |
Yes |
|
Google Authenticator Support for Captive Web Portal |
Yes |
Yes |
||
Active Directory SSO |
Agent Based |
Agentless |
||
External User Directory Integration (LDAP/RADIUS/SMTP/POP3/IMAP/SAML2) |
Yes |
|||
FIDO (Biometric) authentication for administrator, Captive Web Portal and Agent |
Yes |
|||
Multifactor Authentication (Text Message/Email/Google OTP) |
Admin Only |
Yes |
||
Hardware security chip TPM EK-based device authentication |
Yes |
|||
Network Access Control |
802.1X based Control (RADIUS Server, EAP, MAB, VLAN Assign, CoA) |
Yes |
Yes |
|
ARP based Layer 2 Enforcement |
Yes |
Yes |
||
Port Mirroring (SPAN) based Enforcement |
Yes |
Yes |
||
In-line Enforcement (Dual-homed Gateway) |
Yes |
Yes |
||
Switch integration (SNMP) based Enforcement |
Yes |
Yes |
||
DHCP based Enforcement (DHCP Server) |
Yes |
Yes |
||
Role based Access Control |
Yes |
Yes |
||
IP Address Management(IPAM) |
Yes |
Yes |
||
Tag-Based Control of Users, Wlans and Devices/Nodes (E.g., Guest devices, temporary privileges, policy exemptions) |
Yes |
Yes |
||
Cloud Security |
Cloud Workload Visibility |
Yes |
||
Policy server operation in the cloud |
Yes |
|||
Automated Cloud Control using CLI Interface |
Yes |
|||
Cloud Security Group Management |
Yes |
|||
Desktop Management |
Compliance Check (Antivirus, OS Update, Required SW, OS Settings) |
Yes |
Yes |
|
OS Configuration (Screenlock, Internet Options, DNS) |
Yes |
|||
Windows Update Management (Offline Update, Update Cache, Approval) |
Yes |
|||
External Device Control (USB and etc.) |
Yes |
|||
802.1X Connection Profile Provisioning (Wireless/Wired) |
Yes |
|||
EAP-GTC Plugin for Windows (Support Regacy Password Authentication) |
Yes |
|||
WLAN Control (SSID Whitelist, SoftAP block) |
Yes |
|||
Integration |
User Directory Sync (RDBMS, Active Directory, LDAP, Google) |
Yes |
||
Webhook / Syslog / SNMP trap (Outbound) |
Yes |
|||
REST API (Inbound) |
Yes |
|||
Syslog Server (Inbound) |
Yes |
|||
Business Process |
User Consent Pages |
Yes |
||
Request/Approval via CWP (IP, Device, User, Guest User, External Device) |
Yes |
|||
Role based Administrator |
Yes |
|||
Custom Fields (Node, Device, User) |
Yes |
|||
Custom Captive Portal Pages |
Yes |
|||
Multilingual Support |
Yes |
|||
Streamline repetitive tasks using workflow templates |
Yes |
|||
Scalability and Availability |
High Availability (Policy Server / Network Sensor) |
Yes |
||
Interface Channel Bonding |
Yes |
|||
Disaster Recovery (DB Replication, Redundant Policy Server) |
Yes |