15 years helping Israeli businesses
choose better software

Network Access Control (NAC) Software

Network Access Control (NAC) Software helps ensure the security of network infrastructure and devices through enforcement of policies and by granting access permissions to users. It provides tools to improve the visibility and compliance capabilities of endpoints and blocks unauthorized users from entering the system.

Israel Show local products

47 results

Cloud-based physical security solution that helps businesses manage and monitor access across facilities from a centralized platform. Learn more about Brivo Access
Leading cloud-based access control and smart spaces technology that bring keyless entry, mobile credentials, remote security management, smart locks, visitor management and identity management solutions to market. The Brivo platform enables security automation, remote management, elevates employee and tenant experience, and improves the safety of all people and assets in any type of physical space. Learn more about Brivo Access

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
With Pulseway Network Access Control - Monitor, manage & implement policies for controlling devices and user access to their networks.
With Pulseway all-in-one Network Access Control software you can monitor, manage and implement policies for controlling devices and user access to their networks. Identify different network devices, turn an existing Pulseway agent into a probe that detects and, where possible, identify all agents on the network. You can then enroll any discovered device that you want to monitor. Start your free trial today! Learn more about Pulseway

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
SecureLink, an Imprivata company, is the industry leader in critical access management
SecureLink, an Imprivata company, is the industry leader in critical access management, empowering organizations to secure access to their most valuable assets, including networks, systems, and data. By leveraging zero trust principles, machine learning, and artificial intelligence, SecureLink provides comprehensive security solutions to govern, control, monitor, and audit the most critical and highest risk access points. Learn more about SecureLink

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Award-winning N‑able RMM has evolved to include remote access, ticketing, and billing in one complete solution.
N-able N-sight RMM (formerly N-able RMM) is a complete remote monitoring and management platform designed to make managing, maintaining, and protecting IT assets easy for IT service providers, MSPs, and in-house IT professionals. From a single web-based dashboard, you get fast access and support tools, robust remote monitoring and management with patch management and drag & drop automation included, and ticketing & billing. N-able N-sight RMM is built for those who need to do more and earn more Learn more about N-sight

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Israel Local product
Perimeter 81 radically simplifies network security by making the internet your corporate network.
Perimeter 81 radically simplifies network security by offering enterprise-grade, secure remote access and network capabilities through the cloud. It can be managed worldwide without being limited by physical infrastructure, allowing remote workers to securely connect to corporate resources. With features like Firewall as a Service, Zero Trust Network Access, and Secure Web Gateway you can secure your company with a comprehensive and easy-to-use platform in just a few clicks. Learn more about Perimeter 81

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
ITAM Software: Track complete hardware & software asset life-cycles, licenses, contracts, certificates, renewal reminders, and more!
Device42 is the most comprehensive discovery system for Hybrid IT available today. Continuously discover, map, and optimize infrastructure and applications across data center and cloud environments. Device42 intelligently groups discovered workloads by application affinities, dramatically reducing the effort required to create move groups, capturing all communications. Customers across 60 countries use these capabilities to manage and modernize their IT infrastructure and application landscapes. Learn more about Device42

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Provides cloud-managed keyless access for your office or building. It allows you to unlock the door with your smartphone.
Provides cloud-managed keyless access for your office or building. It allows you to unlock the door with your smartphone. Learn more about Kisi

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Avoid sending emails outside working hours by Google Workspace users. Control employees by time and location. Simple with few clicks.
What does compliance analyst say about employees sending emails outside working hours? Conecta Control allows you to limit access to work tools such as Gmail, Drive and Document by browser, cell phone, Outlook and others. Create user groups and control their access to Google Workspace (G Suite) by time and location (IP or DNS). Apply multi email signatures and send bulk vacation messages. Join thousands of users and improve your company's security and control. Learn more about Conecta Suite

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Kentik is the network observability company. Our platform is a must-have to plan, run, and fix any network.
Kentik is the network observability company. Our platform is a must-have for the network front line for companies that depend on a highly performant network. Network and cloud professionals turn to Kentikto plan, run, and fix any network, relying on our granularity, AI-driven insights, and insanely fast search. Kentik makes sense of network, cloud, host, and container flow, internet routing, DDoS defense, performance tests, and network metrics. Learn more about Kentik

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Enables all corporate compliance stakeholders to collaboratively define and oversee proper SoD enforcement.
Enables all corporate compliance stakeholders to collaboratively define and oversee proper SoD enforcement. Learn more about SAP Access Control

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Designed to adapt — secure network access solutions tailored to evolving business needs.
Network Access Control (NAC) is a policy of securely accessing the network and restricting unauthorized users or devices outside of it. Any unverified attempts to connect are supervised and detected by IT administrators responsible for enforcing NAC security policy. However, it’s a labor-intensive task that requires resources and attention to detail — to minimize the workload and increase performance quality, NordLayer offers a centralized Control Panel that supports access activity monitoring. Learn more about NordLayer

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Privileged Password Manager for Enterprises
ManageEngine Password Manager Pro is a web-based, privileged password management solution tailored for enterprises. It securely stores and manages sensitive information such as shared passwords, documents, and digital identities. Password Manager Pro is a complete solution to control, manage, monitor, and audit the entire life cycle of privileged access. In a single package, it offers three solutions - privileged account management, remote access management, and privileged session management. Learn more about ManageEngine Password Manager Pro

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
ThreatLocker Network Control is an easy to use endpoint firewall solution that gives you control over all network traffic.
ThreatLocker Network Control is an easy to use endpoint firewall solution that gives you control over all network traffic, so you don’t leave devices or data vulnerable and exposed to cyber threats. Gain kernel level control over your endpoints with a protection platform for what is permitted to run and how programs, people, and files can interact. Experience the benefits of a Zero Trust posture at the endpoint by scheduling a demo with ThreatLocker today. Learn more about ThreatLocker

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Foxpass, by Splashtop, secure Wi-Fi and Server access control with both username/password and passwordless authentication.
Foxpass RADIUS, by Splashtop, secures your company or school’s Wi-Fi Network. We integrate with your existing directory infrastructure and support passwordless and username/password authentication for a set it and forget it experience. Foxpass Server Access, by Splashtop, is designed for engineers who want to secure access for their Linux servers. Learn more about Foxpass

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Genea Access Control is a cloud-based access control platform that provides physical security to buildings and enterprises.
Genea Access Control is a cloud-based platform that provides physical security for commercial buildings and enterprises. The solution includes mobile-based access control, visitor management, access logs, out-of-the-box integrations, non-proprietary access control hardware, Employee Badge in Apple Wallet, 24/7 support & more. Our software allows building tenants to self-manage access for their employees to the building through the main entrance, parking garage, and any other access points. Learn more about Genea Access Control

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Reduce the time required to manage critical changes and repetitive tasks across complex, multi-vendor networks.
SolarWinds Network Configuration Manager (NCM) delivers powerful network configuration and compliance management. Automate config backups, so you can quickly roll back a blown configuration or provision a replacement device. Continuously audit configs and get alerted if a device is out of compliance, then remediate vulnerabilities rapidly through bulk config deployment. Prevent unauthorized network changes through change delegation, monitoring, and alerting. Learn more about SolarWinds Network Configuration Manager

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Features include graphic mapping, role-based identity management, email notifications, peer-to-peer replication, and area mustering.
Features include graphic mapping, role-based identity management, email notifications, peer-to-peer replication, and area mustering. Learn more about Access Control Manager

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Provides built-in context-based policy engine, device profiling and comprehensive posture assessment, and guest access options.
Provides built-in context-based policy engine, device profiling and comprehensive posture assessment, and guest access options. Learn more about Aruba ClearPass

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Portnox offers cloud-native network & endpoint security essentials that enable IT teams to address today's pressing security challenges
Great for all industries with 500-10,000 Employees. Portnox CLEAR is the only cloud-native network access control (NAC) solution that unifies essential network and endpoint security capabilities: device discovery, network authentication, access control, network hardware administration, risk mitigation and compliance enforcement. As a cloud service, Portnox CLEAR is vendor agnostic and eliminates the need for on-going maintenance such as upgrades and patches and requires no on-site appliances. Learn more about Portnox CLEAR

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
NACVIEW is a modern, easy to implement and integrate network access control solution.
NACVIEW is a modern, easy to implement and integrate network access control solution. NACVIEW provides visibility of all connected devices across the whole network. A variety of profiling methods allows you to define what is connected to your network (type of device, operating system, etc. NACVIEW accurate and granular policies enable you to define what devices can connect to your network. Politics can build based on many different factors like a group of users, group of devices, type, etc. Learn more about NACVIEW

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Banyan’s ZTNA solution provides secure one-click access to applications and infrastructure from anywhere – without legacy VPNs.
Banyan Security’s Zero Trust Newtork Access (ZTNA) solution enables fast, easy provisioning of user-to-application segmentation, giving users passwordless, one-click access to corporate applications, resources, and infrastructure from anywhere – without needing network-centric legacy VPNs. Risk and security are continuously evaluated and enforced in real-time across hybrid, multi-cloud, and SaaS environments. Learn more about Banyan Security

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
On a mission to improve safety and security for the built world, Openpath creates smart, flexible access control systems.
On a mission to improve safety and security for the built world, Openpath creates smart, flexible access control systems. Sleek, secure hardware and convenient, touchless mobile entry enhances the user experience, while cloud-based enterprise software and built-in video capabilities effortlessly scale to make remote system management easier than ever. Openpath is a complete access control system designed to secure anywhere from a single door up to hundreds of entries across multiple locations. Learn more about Openpath

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for the hybrid enterprise.
Appgate SDP, the industry’s most comprehensive universal ZTNA solution, is purpose-built on a direct-routed software-defined perimeter model. It can secure all user-to-resource and resource-to-resource connections across every enterprise use case including remote, on-premises, multi-cloud, cloud native, legacy applications and infrastructure, IoT and OT. Appgate helps organizations and government agencies worldwide start and accelerate their Zero Trust journey while planning for the future. Learn more about Appgate SDP

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Verkada offers an ecosystem of security products including cameras, access control, sensors, alarms, visitor management, and intercom.
Verkada is the leader in cloud-managed enterprise building security, enabling over 20,000 organizations worldwide to protect their people, assets and privacy. Designed with simplicity in mind, Verkada’s six product lines — video security cameras, door-based access control, video intercom, air quality sensors, alarms and workplace solutions — provide unparalleled visibility through a single software platform. Learn more about Verkada

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Zentry Security provides secure, Zero Trust Network Access (ZTNA) for SMEs through its easy-to-use, unified platform.
Zentry Security provides secure, Zero Trust Network Access (ZTNA) for SMEs through its easy-to-use, unified platform. Zentry Security’s secure remote access solution leverages both client and clientless approaches to optimize the customer experience and ease the burden on administrators while simultaneously increasing security posture, providing greater insight into users and applications. Unlike traditional VPNs, Zentry Security’s SaaS platform can be rapidly deployed, configured, and managed. Learn more about Zentry Trusted Access

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Teleport (OSS & Enterprise) is a gateway for managing access to K8s clusters, Linux & Windows servers, databases, and applications.
Teleport is a secure access solution that consolidates infrastructure access into a single platform. With Teleport, engineers and security teams get unified access to Linux and Windows servers, Kubernetes clusters, databases, and DevOps applications like CI/CD, version control, and monitoring dashboards across all environments. Teleport replaces VPNs, shared credentials, and legacy privileged access management technologies to improve security and engineering productivity. Learn more about Teleport

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
VMware AppDefense is an endpoint protection platform that improves the security of your applications from within the hypervisor.
VMware AppDefense is an endpoint protection platform that improves the security of your applications from within the hypervisor. The solution allows users to accelerate security operations, assure workloads, protect workloads and enhance micro-segmentation effectiveness. Learn more about VMware AppDefense

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Carbon Black App Control is an application access control solution that allows security operations teams to protect critical systems.
Carbon Black App Control is an application access control solution that allows security operations teams to protect critical systems. Learn more about Carbon Black App Control

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
PureDome offers robust network access control with encrypted connections for businesses of all sizes, within minutes.
PureDome offers robust network access control with its encrypted connections, dedicated IPs, and device posture checks. Seamlessly integrated into existing infrastructures, businesses can efficiently manage access permissions and ensure secure network access. With comprehensive endpoint protection and 24/7 support, PureDome safeguards against unauthorized access and data breaches. Benefit from secure, reliable, and quick cybersecurity for businesses. Learn more about PureDome

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Re-imagined Network Access Control for the World of IoT
Genian NAC helps maintain full visibility & control of all IT assets and ensures them to be the highest level of security and compliance through flexible deployment options (Cloud or on-prem). Genian NAC also provides a consistent and reliable access experience to all authorized users and keeps non-compliant devices to the highest level of security compliance automatically through comprehensive IT management solution. Learn more about Genian NAC

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Cyber and end point security software providing user control, internal network traffic management, and financial transaction tracking.
Cyber and end point security software providing user control, internal network traffic management, and financial transaction tracking. Learn more about Adept Secure

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
StrongDM gives technical staff a direct route to the critical infrastructure they need to be their most productive.
StrongDM is a People-First Access platform that gives technical staff a direct route to the critical infrastructure they need to be their most productive. End users enjoy fast, intuitive, and auditable access to the resources they need. Administrators gain precise controls, eliminating unauthorized and excessive access permissions. IT, Security, DevOps, and Compliance teams can easily answer who did what, where, and when with comprehensive audit logs. Learn more about strongDM

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Remote.It creates virtual private networks that are easier to manage than traditional VPNs and implement zero trust network access.
Remote.It creates virtual private networks. Unlike VPN networks that create a tunnel to a specific subnet range and require manual network configuration for each resource, Remote.It automatic manages the network configuration for you. You don't have to manage IP address ranges, subnet collisions, VLAN tags, route tables, access control lists. Remote.It enables users to connect to as many different networks as needed. Network connections are easier to manage and more secure. Learn more about remote.it

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Klevio is the only key management solution where you can lock / unlock your existing doors, from anywhere, 24/7.
Klevio is the only key management solution where you can lock / unlock your existing doors, from anywhere, at any time. With the Klevio suite you have everything to easily manage access to your property or business: - Klevio hardware is installed at the property to deliver secure keyless access - The Klevio Dashboard is your access management tool with advanced key sharing & monitoring features - The Klevio Phone App is the digital key - the more secure and convenient way to unlock doors Learn more about Klevio

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Cloud-based network monitoring platform that helps businesses assess the performance & bandwidth of applications.
Cloud-based network monitoring platform that helps businesses assess the performance & bandwidth of applications. The software allows users to simplify operations, monitor application performance, enable firewalls and more. Learn more about VMware SD-WAN

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Mainframe security suite of products for real-time threat detection, user authorization, and cybersecurity compliance.
Mainframe security suite for real-time threat detection, user authorization, and cybersecurity compliance. The suite includes the following products: IBM Z Multi-Factor Authentication, zSecure Command Verifier, zSecure Audit, zSecure Alert, zSecure Admin, zSecure Visual, zSecure CICS Toolkit, and zSecure Manager for RACF z/VM. Learn more about IBM Security zSecure

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Network, automation and management platform to build your virtual private topology and integrate on-prem and multi-cloud environments.
mmesh is an all-in-one, easy-to-use hybrid cloud integration platform with automation, monitoring and management capabilities to build your own virtual private architecture and integrate your on-premise and multi-cloud environments in minutes. The mmesh cloud networking engine is ready for Web3 and enforces end-to-end encryption over QUIC streams. mmesh integrates your Kubernetes apps with other cloud-based or legacy infrastructure without adding a single line of code or configuration. Learn more about mmesh

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Cloud-based application delivery solution that helps user access the right apps, while meeting your business requirements.
VMware SASE is a cloud-based application delivery solution that helps you to use the right apps, at the right time and location, while meeting your business requirements. Learn more about VMware SASE

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Secure Internet Gateway includes SaaS-delivered DNS Filtering that monitors and secures web access for users.
Secure Internet Gateway includes SaaS-delivered DNS Filtering that monitors and secures web access for users. Pricing is based on the number of endpoints and is additive to ZeroThreat Advanced. Learn more about Xcitium Secure Internet Gateway

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Cloud-based cybersecurity platform that lets users identify threats, protect data, simplify architectures, and more.
Cloud-based cybersecurity platform that lets users identify threats, protect data, simplify architectures, and more. Learn more about Todyl Security Platform

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Advanced SASE provides users with a universally distributed, identity-centric security and networking platform for secure connections.
Advanced SASE provides users with a universally distributed, identity-centric security and networking platform for secure connections. The solution helps organizations manage authorized users, threat prevention, traffic routing and more. Learn more about Advanced SASE

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
M4IP is a zero trust network access module that protects anything with an IP Address from unverified access.
M4IP is a zero trust network access module that protects anything with an IP Address from unverified access. Learn more about M4IP

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Network access solution that helps organizations manage granular access controls.
Network access solution that helps organizations manage granular access controls. Learn more about BlastShield

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Experience Superior Secure Access and Seamless Connectivity with MicroZAccess: the leading ZTNA Solution for your Enterprise.
MicroZAccess is a Leading multi-layered, Zero Trust Network Access Solution compliant with NIST 800-207. It: Ensures Granular Access to Data and Applications Reduces attack surface by 90% in Secure Remote Access Protects cloud workloads with micro-segmentation Enhances IT teams & DevOps productivity. The Unique Features include: Direct endpoint to endpoint Mesh connectivity Accelerated deployments with SAML2 integration Stronger security with Device Trust and Multi-factor Authentication. Learn more about MicroZAccess

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Cloud-based & on-premise tool that helps businesses streamline network management via traffic analysis, performance tracking, and more.
Cloud-based & on-premise tool that helps businesses streamline network management via traffic analysis, performance tracking, change configuration, and more. Learn more about Network Automation Manager

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Cloudbrink delivers a secure, high-performance zero-trust access service that solves end-to-end performance issues.
Cloudbrink delivers the only highest-performance connectivity for the modern hybrid workforce anywhere in the world. Cloudbrink delivers accelerated performance for cloud, SaaS, and data center Apps. Cloudbrink’s software-only solution includes the world's first high-performance ZTNA with personal SD-WAN and Automated Moving Target Defense (MTD). Using thousands of dynamic PoPs called FAST edges, Cloudbrink provides an in-office experience with a 30x increase in application performance. Learn more about Cloudbrink

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System
Aserto is a fine-grained authorization service. It makes it easy for developers to add resource-level access controls to apps and APIs.
Aserto helps developers build secure applications. It makes it easy to add fine-grained, policy-based, real-time access control to your apps and APIs.
 Aserto handles the heavy lifting required to achieve secure, scalable, high-performance access management. It offers blazing-fast authorization of a local library coupled with a centralized control plane for managing policies, users, authorization data, and decision logs. And it comes with everything you need to implement RBAC,ABAC and ReBAC. Learn more about Aserto

Features

  • Policy Creation
  • Access Controls/Permissions
  • Multiple Authentication Methods
  • Intrusion Prevention System