Guest Management
The guest management solution enables the IT department to delegate the production of guest credentials to the people who invite the guests, it automates the process of notifying the guest of their credentials and manages the lifetime of the credentials (expiry). It also provides management tools to monitor and report on guest activity.
Create and Email guest credentials
People who need to create guest accounts are called guest sponsors. Sponsors log in to the guest sponsor portal, enter guest details and then the system creates guest credentials and access rights. Credentials are then printed or emailed / sms messaged to the guest. Guests then gain access via a captive portal. A self service kiosk and payment system is also available.
Device Management and Bring Your Own Device
There is also functionality for active directory users visiting with their own device. When an AD user connects to the network the captive portal redirects the browser to a provisioning server. Once the user is authenticated the provisioning server loads an app. on the user device. This app. autoconfigures corporate 802.1x settings on the device.
Once configured this enables the user to connect to the corporate network, using 802.1x / wpa2 every time they visit – without manual configuration.
Bradford Networks
For those wishing to take security a step further Siracom offers Bradford Networks. Bradford is a multivendor product supporting wired, wireless and vpn (as is Identity Manager)
Bradford takes network access control a step or two further managing the whole connection cycle for people and devices.
Bradford offers a comprehensive security solution including:
Access Control: Identity based access control, role based access control and device based access control
Endpoint Compliance: enabling policies that allow or prohibit access based on the security posture of the end device (patches/AV etc), and automates remediation
Adaptive Security Operates with other security devices to continuously reassess access rights based on security stance and network activity.
Further information available at http://www.siracom.com/identitynetworks.htm or http://www.siracom.com/bradford.htm
No comments:
Post a Comment