Cloudpath – Secure Network Access for BYOD, Guest Users and IT-Owned Devices

About Cloudpath

Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired and wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network and secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access. It lets you deliver a great end-user experience and virtually eliminates helpdesk tickets related to network access. Choose from cloud-based or virtualized on-premises deployment. Cloudpath software supports any user, any device, and any network infrastructure.

Cloudpath Overview

From employees to visitors, from IT-owned assets to personal devices, Cloudpath ES provides a simple approach that unlocks the power of certificate-based Wi-Fi for an interruption-free user experience without the need for IT assistance.

The built-in portal allows users to on-board a wide array of new devices in a self-service, automated manner. With support for issuing certificates via the built-in certificate infrastructure and from existing Public Key Infrastructure (PKI), such as Microsoft CA, Cloudpath Enrolment System allows you to mix-and-match to meet your needs.

Plus, the rich policy controls in Cloudpath ES ensure that every device is uniquely identifiable, provisioned with the appropriate certificate, and has the appropriate policy applied. Policies can be built using traditional mechanisms, like Active Directory and group mapping, along with powerful new mechanisms, including Google Apps for a seamless Chromebook experience.

Cloudpath – Secure BYOD

Simple, Secure, Scalable BYOD

The challenges involved in BYOD include security, usability, and differentiation of personal devices from corporate-issued devices.

The Cloudpath Enrolment System provides automated, self-service access to the secure wireless network for employees authorized to use BYOD devices. Authorization may come from a variety of sources, including authentication via Microsoft Active Directory.

Once authorized, the device may be given access indefinitely or for a period of time along with additional policy options based on WPA2-Enterprise, including dynamic VLAN, access control list (ACL), and/or bandwidth assignment.

The network administrator benefits from knowing that all wireless users are secure and that personal devices have been segregated from IT-owned assets. The network administrator also gains visibility and control on a device-by-device basis.

A New Spin on Guest Access

Cloudpath Enrolment System makes it incredibly simple to extend secure Wi-Fi to visitors of all varieties. Cloudpath Enrolment System goes beyond traditional guest servers by on-boarding guests onto WPA2-Enterprise wireless networks without IT involvement.

With set-it-and-forget-it simplicity, Cloudpath Enrolment System provides unmatched ease of guest on-boarding while providing the network administrator visibility and control over who is granted network access.

IT-Owned Assets

Today, the need to provision thousands of IT-owned mobile devices, from iPhones to Chromebooks, is a consistent challenge. IT-based provisioning scales poorly when dealing with large numbers of devices or geographically dispersed populations.

Cloudpath ES provides the ability to transform the provisioning process and provide a user driven, self-service provisioning process. Based on your policies, these IT assets may be given the appropriate network access without IT ever touching them.

Cloudpath Enrollment System

Increase Security for Users, Devices, Data and the Network

Cloudpath software secures network connections with WPA-2 Enterprise—the highest standard in secure Wi-Fi. The system encrypts data in transit between the device and Wi-Fi access points for maximum security. It lets you define and manage polices for network access so that users see only what they should see. You gain visibility and control over what devices are on the network, and the power to revoke access at any time. A device posture check with remediation during onboarding ensures that only devices with appropriate security safeguards in place gain access.

Streamline Network Access for BYOD Users

The sheer volume and diversity of devices that require network access can cause headaches for IT departments. What if BYOD users could self-provision their devices with intuitive self-service workflows? With the simple onboarding portal in Cloudpath software, they can. Users get a great experience without IT intervention. BYOD users initially gain access with existing login credentials. The system installs a digital certificate on the device so that users authenticate seamlessly from that point forward—without having to re-enter a Wi-Fi password.

Give Visitors Easy, Self-service Guest Wi-Fi

No matter what the environment—schools, colleges, hotels, public venues, or anywhere, really—the first thing visitors ask is “How do I get on the Wi-Fi?” Cloudpath software delivers secure guest access for visitors without involving the IT helpdesk. Guest users simply self-register for internet access via an intuitive portal and receive login information via SMS, email, or printed voucher. You can customize the login portal, guest workflows, terms and conditions, and more for a trouble-free and secure user experience.

Solution Portfolio

Find out about all our technology partners

Industries We Work With

Find out about all the industries we work in and how we may be able to help you

Latest News

A Guide to DMARC Reports and How to Read Them  

Reading and analyzing DMARC reports can provide insights into email behavior to help organizations improve their email protections and deliverability. Key Points DMARC reports provide valuable information about the emails sent from a domain and enable organizations to...

How to Improve Your Cybersecurity On a Lower Budget

A declining economic outlook has security leaders looking to do more with less. Here’s how to boost cybersecurity productivity without sacrificing security. Key Points The uncertain economy is putting pressure on CISOs to do more with less.  Initiatives should be...

Technical Support

Access our technical support hub to view our support packages and how to get help

Predictive, Pre-Deployment, Post Installation and Health Check Wireless Surveys carried out by certified wireless engineers.

We look at Wi-Fi fundamentals, explore the benefits of and technology behind Wi-Fi 6, Wi-Fi 6E and what the future holds for Wi-Fi 7

Net-Ctrl provide network and structured cabling solutions as either a stand-alone installation, or to compliment products and solutions that we offer.

Connect-the-Classroom scheme  is allowing schools to upgrade their infrastructure to a solution that should last 10 years

Net-Ctrl provides two excellent support packages in addition to any equipment purchased. Find out about our Silver or Gold support package

IP-CCTV site survey to assess camera locations and requirement and existing Mobotix solution health checks.

Net-Ctrl offers our Cloud WLAN. Delivering market-leading patented technology managed by the Net-Ctrl engineering team.

We provide an automated Cybersecurity awareness training solution covering both simulated phishing and training courses.

Net-Ctrl offers a range of wireless network solutions. We explore some common questions related to these solutions.

Offering end-to-end, affordable and competitive financing solutions to help you achieve your business goals.