SafeConnect is delivered with standard Policy Modules (Authentication, Guest Registration, Acceptable Use Policy Auditing, Anti-Virus, Anti-Spyware, Microsoft Patch, P2P File Sharing, Access Point, Power Management, and Broadcast Messaging), as well as a Custom Policy Builder Module that allows you to easily create policies, enforcement rules, and custom notification messaging based on file types, services, process, and registry settings that may exist or might not exist on a particular endpoint.
The SafeConnect system provides the ability to build and assign unique/granular policies based on IP address range, VLAN segment, or subnet, or MAC Address. Policies can also be assigned by device type (Windows, Apple, Linux, PDA, Gaming Console, etc.) and by individual user identity based on their role/group membership as defined by the organization’s existing Directory Services (Active Directory, LDAP, etc.) infrastructure.
SafeConnect communicates in real-time with end users, informing them of any change in compliance status and imparting instructions for self-remediation in addition to on-demand broadcast messaging.
Also please note, SafeConnect can distinguish and assign policies based on whether a device is an organization-owned (managed) asset or if it is personally-owned. Therefore, granular network access policies can be applied based on the authentication credentials of the end user (i.e., student, employee, guest, contractor, business partner, etc.).
SafeConnect’s Standard Policy Modules
Prevents unauthorized users from accessing the network and provides the ability to manage unknown, rogue wired or wireless access point devices that may connect to the network.
Guest User Management
Automates a guest user registration process that can restrict endpoint devices to Internet-only access for a period of time. SafeConnect can automate the process of managing restricted network access for guests, which will limit the guest user from accessing any internal resources within the network other than the Internet and other acceptable destinations. For more information about guest management, please click here.
Identifies user identity (via SSO), device type, and ownership. SafeConnect also provides the ability to recognize and auto-connect or block gaming devices, such as Microsoft’s Xbox 360 on the network. For more information about device recognition, please click here.
Acceptable Use Security Policy Auditing
Displays acceptable use policies and gives user the option to accept organization policies prior to accessing network.
Manages compliance with anti-malware software policies. SafeConnect’s Anti-Virus and Anti-Spyware Policy Modules can detect and automate the desired enforcement and remediation policies based on whether the desired software is installed, configured in auto-date/running mode, and if the definitions are up-to-date. The SafeConnect system leverages a wide variety of security anti-virus and anti-spyware software providers that determine the existence and remediation of malware.
Ensures that users are up-to-date with Microsoft OS patches and integrated with existing patch management systems. The SafeConnect system can automate the process of integrating endpoint devices to patch management systems (such as Microsoft WSUS) even if the end user device is not managed by an existing Active Directory policy group domain.
Rogue Access Point
Manages adherence to rogue access point device policies that utilize Network Access Translation (NAT). SafeConnect system can detect whether an endpoint is located behind a Network Access Translation (NAT) device and can perform the applicable enforcement quarantine and remediation action to properly register the device.
HEOA Compliance/P2P File Sharing
Prohibits use of P2P file sharing and non-approved applications. SafeConnect provides the ability to manage the use of illegal file sharing services and other non-compliant applications within the network. The SafeConnect system can detect whether the endpoint device is operating (downloading) material from P2P file sharing services and deliver enforcement and/or warning messages as dictated by the organization. The SafeConnect system can also prevent the endpoint device from outbound P2P file sharing, thus negating the risk of high-bandwidth consuming server farms or Record Industry Association of America (RIAA) take down notices. For more information about complying with HEOA requirements, please click here.
Custom Policy Builder
Build (or integrate) automated custom policies to address endpoint security acceptable standards. The SafeConnect Custom Policy Module enables you to quickly develop and enforce policies that can isolate/quarantine endpoint devices that contain known malware and automate individualized messaging to remediate. The SafeConnect system will provide the ability to create custom enforcement, remediation policies, and individualized messaging for unique security or regulatory requirements. Build policies based on the existence or non-existence of file types, registry settings, services, and processes on individual endpoint devices.
Automates the user experience of “on-ramping” devices unto WPA2 Enterprise/802.1x secure wireless and wired networks. For more information, please click here.
This is an optional module.