Rebasoft’s specialised use of traffic profiling allows devices and endpoints of all types to be secured. This method of traffic profiling is critical where software agent based protection is unavailable or uneconomic to deploy. Whether it is users with laptops, BYODs, printers, servers or in fact any IP enabled device – Rebasoft can identify it, finger print the device, monitor it and if needed, remediate it.
Rebasoft’s ensures real-time and ongoing monitoring of all endpoints while connected to the network, rather than just at the point of access. This ongoing monitoring of the behavior of all devices on the network is crucial in combating modern attacks, quickly mitigating their effect and ensuring that you are always compliant with your security policy.
When end-points don’t measure up to an organisations policies and standards, Rebasoft automatically initiates one or more policy-based enforcements and remediation actions; like email nofication and/or mandatory remediation to full quarantine or access prevention.
Rebasoft’s software can be deployed on physical or virtual servers in a centralised or distributed model. This means our deployment does not require agents, including configuration of every endpoint and/or rely upon network probes or “collector appliances” deployed in various locations to detect traffic information.
This innovate approach to NAC deployment allows it be easier and less costly than the traditional methods, while still ensuring that you have full coverage and control of the entire network.