Securing access is simple with ClearPass Guest, OnBoard and OnGuard. Whether a contractor, student, corporate guest, staff or BYOD device, ClearPass access products ensure the right people gain access to the correct networks with authorized devices.
Enterprise-grade security and controls.
ClearPass Guest includes login and traffic encryption options for secure access to public networks. Self-registration, social logins and sponsor options ensure guest access credentials and privileges are enforced without burdening the IT helpdesk.
See ClearPass Guest in action
Create a customized guest access portal.
We make it easy to create a customized guest web portal using your organization’s logo and other distinctive brand elements. It’s equally simple to create unique data-entry fields for guest names, sponsors, email, mobile numbers and acceptance of use.
Learn about Portal Design Service
Automate device provisioning for secure BYOD.
A built-in certificate authority allows for simple, automated provisioning of 802.1X certificates. This enables secure wired and wireless network connectivity on Windows, Mac OS X, iOS, Ubuntu, Chromebook and Android mobile devices.
Watch the video
BYOD is here to stay. Is your enterprise ready?
Our planning guide will help with decisions regarding network access and control for BYOD, including timelines, policies, roles (users and devices), use of device certificates, and other best practices for deploying Aruba ClearPass to leverage third party security defenses, like firewalls and MDM/EMM.
Download the planning guide
Automate health checks and posture assessments.
In addition to system-wide per-session NAC protection, you can specify whether to allow or deny peer-to-peer applications or USB storage devices. Network access can be denied if storage is not encrypted and IT can be sure that laptops brought to the help desk have the latest patches and hot fixes.
Read the ClearPass OnGuard data sheet
ClearPass OnGuard in action
Ensure device compliance before they ever connect.
You can automatically remediate or quarantine endpoints that are not in compliance with corporate posture policies. Using the administrator dashboard, it’s easy to keep an eye out for non-compliant devices, users, and the reasons for non-compliance.
Read the solution overview