ClearPass Policy Manager Platform

QuickSpecs
Aruba ClearPass Policy Manager Platform
Overview
Page
1
Aruba ClearPass Policy Manager Platform
The most advanced Secure NAC platform available
Product overview
Aruba's ClearPass Policy Manager, part of the Aruba 360 Secure Fabric, provides role- and device-based secure network access
control for IoT, BYOD, Corporate devices, the employees, contractors and guests across any multivendor wired, wireless and VP
N
infr
astructure that use them.
With a built
-in context-based policy engine, RADIUS, TACACS+, non-RADIUS enforcement using OnConnect, device profiling,
posture assessment, onboarding, and guest access options, ClearPass is unrivaled as a foundation for network
security for
organizations of any size.
For comprehensive integrated security coverage and response using firewalls, EMM/MDM and other existing solutions, ClearPass
supports the Aruba 360 Security Exchange Program. This allows for automated threat detecti
on and response workflows that
integrate with third
-party security vendors and IT systems previously requiring manual IT intervention.
In addition, ClearPass supports secure self
-service capabilities making it easier for end users trying to access the network. Users
can securely configure their own devices for enterprise use or Internet access. Aruba wireless customers in particular can ta
ke
advantage of the enhanced security of their AirGroup environment as well as ClearPass Auto Sign
-On. This enables a user's
network authentication to pass automatically to their enterprise mobile apps so they can get right to work.
The result is detailed visibility of all wired and wireless devices connecting to the enterprise, increased control through s
implified
and automated authentication or authorization of devices, and faster, better incident analysis and response through the integration
of Aruba IntroSpect UEBA and third
-party partner ecosystems. This is achieved with a comprehensive and scalable policy
management
platform that goes beyond traditional AAA solutions to deliver extensive enforcement capabilities for IT-owned and
bring-your-own-device (BYOD) security requirements.
Key Features
Role-based network access enforcement for multi-vendor Wireless, wired and VPN networks.
Virtual and hardware appliances that can be deployed in a cluster to increase scalability and redundancy.
Intuitive policy configuration templates and visibility troubleshooting tools.
Supports multiple authentication/authorization sources (AD, LDAP, SQL dB).
Self-service device onboarding with built-in certificate authority (CA) for BYOD

Summary of content (8 pages)