17 years helping New Zealand businesses
choose better software

Network Access Control System (NAC)

Network Access Control (NAC) Software helps ensure the security of network infrastructure and devices through enforcement of policies and by granting access permissions to users. It provides tools to improve the visibility and compliance capabilities of endpoints and blocks unauthorized users from entering the system.

VPN and Zero-Trust Network Access (ZTNA) solutions to easily secure your business network assets and set up secure remote access. Learn more about UTunnel VPN
UTunnel Secure Access provides Cloud VPN, Zero-Trust Network Access (ZTNA), and Mesh Networking solutions. This allows businesses to set up secure remote access for employees and ensures encrypted connectivity between corporate networks, data centers, offices, VPCs, IoT devices, or standalone hosts. UTunnel facilitates blazing-fast VPN server deployments, web-browser-based agent-less resource access, and policy-based user and team access management, letting you manage remote access with ease. Learn more about UTunnel VPN

Features

  • Access Controls/Permissions
  • Policy Creation
  • Intrusion Prevention System
  • Multiple Authentication Methods
With Pulseway Network Access Control - Monitor, manage & implement policies for controlling devices and user access to their networks.
With Pulseway all-in-one Network Access Control software you can monitor, manage and implement policies for controlling devices and user access to their networks. Identify different network devices, turn an existing Pulseway agent into a probe that detects and, where possible, identify all agents on the network. You can then enroll any discovered device that you want to monitor. Start your free trial today! Learn more about Pulseway

Features

  • Access Controls/Permissions
  • Policy Creation
  • Intrusion Prevention System
  • Multiple Authentication Methods
ManageEngine Network Configuration Manager, an all-in-one solution to your network configuration, compliance & change management needs.
With ManageEngine Network Configuration Manager (NCM), - Track & manage the configuration changes with real-time notifications. - Stay compliant to industry standards with custom rules & policies. - Be prepared with automated configuration backups to save your day. Join fellow network admins around the world and manage your configurations better with our cost-efficient solution. Learn more about ManageEngine Network Configuration Manager

Features

  • Access Controls/Permissions
  • Policy Creation
  • Intrusion Prevention System
  • Multiple Authentication Methods
Secure remote access solution to your private network, in the cloud or on-prem.
OpenVPN Access Server is a full-featured SSL VPN software solution that integrates OpenVPN server capabilities, enterprise management capabilities, simplified OpenVPN Connect UI, and OpenVPN Client software packages that accommodate Windows, MAC, and Linux, mobile OS (Android and iOS) environments. OpenVPN Access Server supports a wide range of configurations, including secure and granular remote access to internal network and/ or private cloud network resources and applications with fine-grained access control. Learn more about Access Server

Features

  • Access Controls/Permissions
  • Policy Creation
  • Intrusion Prevention System
  • Multiple Authentication Methods
SecureLink, an Imprivata company, is the industry leader in critical access management
SecureLink, an Imprivata company, is the industry leader in critical access management, empowering organizations to secure access to their most valuable assets, including networks, systems, and data. By leveraging zero trust principles, machine learning, and artificial intelligence, SecureLink provides comprehensive security solutions to govern, control, monitor, and audit the most critical and highest risk access points. Learn more about SecureLink

Features

  • Access Controls/Permissions
  • Policy Creation
  • Intrusion Prevention System
  • Multiple Authentication Methods
Perimeter 81 radically simplifies network security by making the internet your corporate network.
Perimeter 81 radically simplifies network security by offering enterprise-grade, secure remote access and network capabilities through the cloud. It can be managed worldwide without being limited by physical infrastructure, allowing remote workers to securely connect to corporate resources. With features like Firewall as a Service, Zero Trust Network Access, and Secure Web Gateway you can secure your company with a comprehensive and easy-to-use platform in just a few clicks. Learn more about Perimeter 81

Features

  • Access Controls/Permissions
  • Policy Creation
  • Intrusion Prevention System
  • Multiple Authentication Methods
Award-winning N‑able RMM has evolved to include remote access, ticketing, and billing in one complete solution.
N-able N-sight RMM (formerly N-able RMM) is a complete remote monitoring and management platform designed to make managing, maintaining, and protecting IT assets easy for IT service providers, MSPs, and in-house IT professionals. From a single web-based dashboard, you get fast access and support tools, robust remote monitoring and management with patch management and drag & drop automation included, and ticketing & billing. N-able N-sight RMM is built for those who need to do more and earn more Learn more about N-sight

Features

  • Access Controls/Permissions
  • Policy Creation
  • Intrusion Prevention System
  • Multiple Authentication Methods
ThreatLocker Network Control is an easy to use endpoint firewall solution that gives you control over all network traffic.
ThreatLocker Network Control is an easy to use endpoint firewall solution that gives you control over all network traffic, so you don’t leave devices or data vulnerable and exposed to cyber threats. Gain kernel level control over your endpoints with a protection platform for what is permitted to run and how programs, people, and files can interact. Experience the benefits of a Zero Trust posture at the endpoint by scheduling a demo with ThreatLocker today. Learn more about ThreatLocker

Features

  • Access Controls/Permissions
  • Policy Creation
  • Intrusion Prevention System
  • Multiple Authentication Methods
ITAM Software: Track complete hardware & software asset life-cycles, licenses, contracts, certificates, renewal reminders, and more!
Device42 is the most comprehensive discovery system for Hybrid IT available today. Continuously discover, map, and optimize infrastructure and applications across data center and cloud environments. Device42 intelligently groups discovered workloads by application affinities, dramatically reducing the effort required to create move groups, capturing all communications. Customers across 60 countries use these capabilities to manage and modernize their IT infrastructure and application landscapes. Learn more about Device42

Features

  • Access Controls/Permissions
  • Policy Creation
  • Intrusion Prevention System
  • Multiple Authentication Methods
Kisi is a cloud-based access control software that manages door access for security.
Kisi is a cloud-based access control and security platform that allows users to remotely manage door access to their spaces through a mobile application or secure badges. The software provides access logs, customized access levels, video intercom integration, analytics, and instant lockdown capabilities. Kisi offers enhanced security, simplified operations, and compliance benefits for commercial real estate, manufacturing, healthcare, fitness, education, local government, and more. Learn more about Kisi

Features

  • Access Controls/Permissions
  • Policy Creation
  • Intrusion Prevention System
  • Multiple Authentication Methods
Cloud-based physical security solution that helps businesses manage and monitor access across facilities from a centralized platform.
Leading cloud-based access control and smart spaces technology that bring keyless entry, mobile credentials, remote security management, smart locks, visitor management and identity management solutions to market. The Brivo platform enables security automation, remote management, elevates employee and tenant experience, and improves the safety of all people and assets in any type of physical space. Learn more about Brivo Access

Features

  • Access Controls/Permissions
  • Policy Creation
  • Intrusion Prevention System
  • Multiple Authentication Methods
Avoid sending emails outside working hours by Google Workspace users. Control employees by time and location. Simple with few clicks.
What does compliance analyst say about employees sending emails outside working hours? Conecta Control allows you to limit access to work tools such as Gmail, Drive and Document by browser, cell phone, Outlook and others. Create user groups and control their access to Google Workspace (G Suite) by time and location (IP or DNS). Apply multi email signatures and send bulk vacation messages. Join thousands of users and improve your company's security and control. Learn more about Conecta Suite

Features

  • Access Controls/Permissions
  • Policy Creation
  • Intrusion Prevention System
  • Multiple Authentication Methods
Kentik is the network observability company. Our platform is a must-have to plan, run, and fix any network.
Kentik is the network observability company. Our platform is a must-have for the network front line for companies that depend on a highly performant network. Network and cloud professionals turn to Kentikto plan, run, and fix any network, relying on our granularity, AI-driven insights, and insanely fast search. Kentik makes sense of network, cloud, host, and container flow, internet routing, DDoS defense, performance tests, and network metrics. Learn more about Kentik

Features

  • Access Controls/Permissions
  • Policy Creation
  • Intrusion Prevention System
  • Multiple Authentication Methods
Enables all corporate compliance stakeholders to collaboratively define and oversee proper SoD enforcement.
Enables all corporate compliance stakeholders to collaboratively define and oversee proper SoD enforcement. Learn more about SAP Access Control

Features

  • Access Controls/Permissions
  • Policy Creation
  • Intrusion Prevention System
  • Multiple Authentication Methods
Designed to adapt — secure network access solutions tailored to evolving business needs.
Network Access Control (NAC) is a policy of securely accessing the network and restricting unauthorized users or devices outside of it. Any unverified attempts to connect are supervised and detected by IT administrators responsible for enforcing NAC security policy. However, it’s a labor-intensive task that requires resources and attention to detail — to minimize the workload and increase performance quality, NordLayer offers a centralized Control Panel that supports access activity monitoring. Learn more about NordLayer

Features

  • Access Controls/Permissions
  • Policy Creation
  • Intrusion Prevention System
  • Multiple Authentication Methods
Privileged Password Manager for Enterprises
ManageEngine Password Manager Pro is a web-based, privileged password management solution tailored for enterprises. It securely stores and manages sensitive information such as shared passwords, documents, and digital identities. Password Manager Pro is a complete solution to control, manage, monitor, and audit the entire life cycle of privileged access. In a single package, it offers three solutions - privileged account management, remote access management, and privileged session management. Learn more about ManageEngine Password Manager Pro

Features

  • Access Controls/Permissions
  • Policy Creation
  • Intrusion Prevention System
  • Multiple Authentication Methods
Foxpass, by Splashtop, secure Wi-Fi and Server access control with both username/password and passwordless authentication.
Foxpass RADIUS, by Splashtop, secures your company or school’s Wi-Fi Network. We integrate with your existing directory infrastructure and support passwordless and username/password authentication for a set it and forget it experience. Foxpass Server Access, by Splashtop, is designed for engineers who want to secure access for their Linux servers. Learn more about Foxpass

Features

  • Access Controls/Permissions
  • Policy Creation
  • Intrusion Prevention System
  • Multiple Authentication Methods
Genea Security is a cloud-based access control security platform that provides physical security to buildings and enterprises.
Genea Security is a cloud-based platform that provides physical security for commercial buildings and enterprises. The solution includes mobile-based access control security, visitor management, access logs, out-of-the-box integrations, non-proprietary access control hardware, Employee Badge in Apple Wallet, 24/7 support & more. Our software allows building tenants to self-manage access for their employees to the building through the main entrance, parking garage, and any other access points. Learn more about Genea Security

Features

  • Access Controls/Permissions
  • Policy Creation
  • Intrusion Prevention System
  • Multiple Authentication Methods
Reduce the time required to manage critical changes and repetitive tasks across complex, multi-vendor networks.
SolarWinds Network Configuration Manager (NCM) delivers powerful network configuration and compliance management. Automate config backups, so you can quickly roll back a blown configuration or provision a replacement device. Continuously audit configs and get alerted if a device is out of compliance, then remediate vulnerabilities rapidly through bulk config deployment. Prevent unauthorized network changes through change delegation, monitoring, and alerting. Learn more about SolarWinds Network Configuration Manager

Features

  • Access Controls/Permissions
  • Policy Creation
  • Intrusion Prevention System
  • Multiple Authentication Methods
Provides built-in context-based policy engine, device profiling and comprehensive posture assessment, and guest access options.
Provides built-in context-based policy engine, device profiling and comprehensive posture assessment, and guest access options. Learn more about Aruba ClearPass

Features

  • Access Controls/Permissions
  • Policy Creation
  • Intrusion Prevention System
  • Multiple Authentication Methods
Features include graphic mapping, role-based identity management, email notifications, peer-to-peer replication, and area mustering.
Features include graphic mapping, role-based identity management, email notifications, peer-to-peer replication, and area mustering. Learn more about Access Control Manager

Features

  • Access Controls/Permissions
  • Policy Creation
  • Intrusion Prevention System
  • Multiple Authentication Methods
Portnox offers cloud-native network & endpoint security essentials that enable IT teams to address today's pressing security challenges
Great for all industries with 500-10,000 Employees. Portnox CLEAR is the only cloud-native network access control (NAC) solution that unifies essential network and endpoint security capabilities: device discovery, network authentication, access control, network hardware administration, risk mitigation and compliance enforcement. As a cloud service, Portnox CLEAR is vendor agnostic and eliminates the need for on-going maintenance such as upgrades and patches and requires no on-site appliances. Learn more about Portnox CLEAR

Features

  • Access Controls/Permissions
  • Policy Creation
  • Intrusion Prevention System
  • Multiple Authentication Methods
Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for the hybrid enterprise.
Appgate SDP, the industry’s most comprehensive universal ZTNA solution, is purpose-built on a direct-routed software-defined perimeter model. It can secure all user-to-resource and resource-to-resource connections across every enterprise use case including remote, on-premises, multi-cloud, cloud native, legacy applications and infrastructure, IoT and OT. Appgate helps organizations and government agencies worldwide start and accelerate their Zero Trust journey while planning for the future. Learn more about Appgate SDP

Features

  • Access Controls/Permissions
  • Policy Creation
  • Intrusion Prevention System
  • Multiple Authentication Methods
NACVIEW is a modern, easy to implement and integrate network access control solution.
NACVIEW is a modern, easy to implement and integrate network access control solution. NACVIEW provides visibility of all connected devices across the whole network. A variety of profiling methods allows you to define what is connected to your network (type of device, operating system, etc. NACVIEW accurate and granular policies enable you to define what devices can connect to your network. Politics can build based on many different factors like a group of users, group of devices, type, etc. Learn more about NACVIEW

Features

  • Access Controls/Permissions
  • Policy Creation
  • Intrusion Prevention System
  • Multiple Authentication Methods
The cloud-delivered, virtualized secure network platform that delivers essential zero trust network access (ZTNA) and VPC integration.
With CloudConnexa your business gets a cloud-delivered service that integrates virtual networking and critical security functions in a secure overlay network that’s easy to deploy and manage. Now you can connect your applications, private networks, workforce, and IoT devices - without complex, hard-to-scale hardware. Your dedicated secure overlay network enables Zero Trust access to all applications and the internet as well as site-to-site networking while enforcing identity-based access control, preventing malicious network activity, and providing protection by blocking malicious website access. The CloudConnexa full-mesh network is accessible from 30+ worldwide locations. Learn more about CloudConnexa

Features

  • Access Controls/Permissions
  • Policy Creation
  • Intrusion Prevention System
  • Multiple Authentication Methods