Network Access Control (NAC) Solutions - Reviews

Overall Rating

Reviewer's Company Size

Vendor

Product

Last Updated

Industry

Department

Experience

Job Type

Role

Reviews (1-16 of 16)

Rob Bates profile photo
Score 8 out of 10
Vetted Review
Verified User
Review Source

If you have a large user base then this is a great tool and companion if you own other SolarWinds products, with the holy grail of a single pane of glass. It's quite young in its life, so we can expect a lot more from SolarWinds in the future in terms of development. If you have a small organizat...

No photo available
Score 9 out of 10
Vetted Review
Verified User
Review Source

Only admins in IT use it. We manage the Dataowner and the Permissions they wanna give to their Users. With ARM we have completely restructured our main File Server and then have redone all of the Permissions based on what the Dataowner wants. We work closely with the Dataowner to make sure everyt...

No photo available
Score 10 out of 10
Vetted Review
Verified User
Review Source

ARM is being used by our IT department mainly for auditing of Active Directory, file server permissions, and Exchange mailbox access. ARM has allowed for visualization of permissions that allow users access to specific resources. Being able to visualize the permissions and access through a single...

No photo available
Score 9 out of 10
Vetted Review
Verified User
Review Source

Easy to use and to manage your Microsoft AD environment, FileRights, and AD Objects and Exchange. Perfect to track your AD changes and GPDR. We have been using it for three years now. Perfect German support.

No photo available
Score 8 out of 10
Vetted Review
Verified User
Review Source

SolarWinds Access Rights Manager is used by our IT department for the quarterly access reviews for audit purposes. We managed to shave hours off the process of generating the report of who has access to what, and now we can even schedule it—pure automation. That was the main reason for the purcha...

No photo available
Score 9 out of 10
Vetted Review
Verified User
Review Source

The firewalls management is made easy through its very good management software. It has a lot of features such as VPN, ATP, IPS, Real-time log views, Active Directory integration, Virus Scanning of traffic / file downloads, High Availability Failover, Qos / Traffic Shaping, and a nice quick glanc...

Luis Cruz profile photo
Score 10 out of 10
Vetted Review
Verified User
Review Source

Another positive impact is lowering the cost of monitoring. This is twofold: First, a rather small team can manage access management. Second, through the use of SAP Access Control the complete universe of roles and users can be monitored without increasing the cost for the continuous monitoring.

Michael Timms profile photo
Score 8 out of 10
Vetted Review
Verified User
Review Source

Sophos Network Access Control would be most effective in an enterprise environment where there are many different groups of users, including guest users because it has the ability to block unauthorized users and control the access of guest users. It would not be well suited for an environment wit...

Mitchell Greenfield profile photo
Score 10 out of 10
Vetted Review
Verified User
Review Source

We selected CounterACT because it didn't require 802.1x and it didn't require any switch upgrades. To use 802.1x we would have to assume all endpoints are guilty until proven innocent. With CounterACT we can detect quickly if endpoints are not compliant and remediate without the user knowing.

No photo available
Score 10 out of 10
Vetted Review
Reseller
Review Source

Anyone that has a business and/or stores client data MUST have a Next Generation Firewall, zero exceptions. If you have multiple sites, configuring a VPN between them takes less than a minute to configure. The surprising thing is that these devices have many more features than their competitors b...

No photo available
Score 8 out of 10
Vetted Review
Verified User
Review Source

ForeScout CounterACT is well suited for a company looking to strengthen their network security. It has allowed us to be confident that there is not a rogue device connecting directly into our network to gain access to company information. It may not be suitable to a company with a small IT depart...