Cloudpath – Secure Network Access for BYOD, Guest Users and IT-Owned Devices
Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired and wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network and secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access. It lets you deliver a great end-user experience and virtually eliminates helpdesk tickets related to network access. Choose from cloud-based or virtualized on-premises deployment. Cloudpath software supports any user, any device, and any network infrastructure.
From employees to visitors, from IT-owned assets to personal devices, Cloudpath ES provides a simple approach that unlocks the power of certificate-based Wi-Fi for an interruption-free user experience without the need for IT assistance.
The built-in portal allows users to on-board a wide array of new devices in a self-service, automated manner. With support for issuing certificates via the built-in certificate infrastructure and from existing Public Key Infrastructure (PKI), such as Microsoft CA, Cloudpath Enrolment System allows you to mix-and-match to meet your needs.
Plus, the rich policy controls in Cloudpath ES ensure that every device is uniquely identifiable, provisioned with the appropriate certificate, and has the appropriate policy applied. Policies can be built using traditional mechanisms, like Active Directory and group mapping, along with powerful new mechanisms, including Google Apps for a seamless Chromebook experience.
Cloudpath – Secure BYOD
Simple, Secure, Scalable BYOD
The challenges involved in BYOD include security, usability, and differentiation of personal devices from corporate-issued devices.
The Cloudpath Enrolment System provides automated, self-service access to the secure wireless network for employees authorized to use BYOD devices. Authorization may come from a variety of sources, including authentication via Microsoft Active Directory.
Once authorized, the device may be given access indefinitely or for a period of time along with additional policy options based on WPA2-Enterprise, including dynamic VLAN, access control list (ACL), and/or bandwidth assignment.
The network administrator benefits from knowing that all wireless users are secure and that personal devices have been segregated from IT-owned assets. The network administrator also gains visibility and control on a device-by-device basis.
A New Spin on Guest Access
Cloudpath Enrolment System makes it incredibly simple to extend secure Wi-Fi to visitors of all varieties. Cloudpath Enrolment System goes beyond traditional guest servers by on-boarding guests onto WPA2-Enterprise wireless networks without IT involvement.
With set-it-and-forget-it simplicity, Cloudpath Enrolment System provides unmatched ease of guest on-boarding while providing the network administrator visibility and control over who is granted network access.
Today, the need to provision thousands of IT-owned mobile devices, from iPhones to Chromebooks, is a consistent challenge. IT-based provisioning scales poorly when dealing with large numbers of devices or geographically dispersed populations.
Cloudpath ES provides the ability to transform the provisioning process and provide a user driven, self-service provisioning process. Based on your policies, these IT assets may be given the appropriate network access without IT ever touching them.
Cloudpath Enrollment System
Increase Security for Users, Devices, Data and the Network
Cloudpath software secures network connections with WPA-2 Enterprise—the highest standard in secure Wi-Fi. The system encrypts data in transit between the device and Wi-Fi access points for maximum security. It lets you define and manage polices for network access so that users see only what they should see. You gain visibility and control over what devices are on the network, and the power to revoke access at any time. A device posture check with remediation during onboarding ensures that only devices with appropriate security safeguards in place gain access.
Streamline Network Access for BYOD Users
The sheer volume and diversity of devices that require network access can cause headaches for IT departments. What if BYOD users could self-provision their devices with intuitive self-service workflows? With the simple onboarding portal in Cloudpath software, they can. Users get a great experience without IT intervention. BYOD users initially gain access with existing login credentials. The system installs a digital certificate on the device so that users authenticate seamlessly from that point forward—without having to re-enter a Wi-Fi password.
Give Visitors Easy, Self-service Guest Wi-Fi
No matter what the environment—schools, colleges, hotels, public venues, or anywhere, really—the first thing visitors ask is “How do I get on the Wi-Fi?” Cloudpath software delivers secure guest access for visitors without involving the IT helpdesk. Guest users simply self-register for internet access via an intuitive portal and receive login information via SMS, email, or printed voucher. You can customize the login portal, guest workflows, terms and conditions, and more for a trouble-free and secure user experience.
Find out about all our technology partners
Industries We Work With
Find out about all the industries we work in and how we may be able to help you
Fortinet Global Report Finds 75% of OT Organizations Experienced at Least One Intrusion in the Last Year
95% of Organizations Expect OT Cybersecurity Responsibility to Shift from Directors and Managers to CISOs in the Next 12 Months John Maddison, EVP Products and CMO at Fortinet “Fortinet’s 2023 State of Operational Technology and Cybersecurity Report shows that while...
A Guide to DMARC Reports and How to Read Them
Reading and analyzing DMARC reports can provide insights into email behavior to help organizations improve their email protections and deliverability. Key Points DMARC reports provide valuable information about the emails sent from a domain and enable organizations to...
How to Improve Your Cybersecurity On a Lower Budget
A declining economic outlook has security leaders looking to do more with less. Here’s how to boost cybersecurity productivity without sacrificing security. Key Points The uncertain economy is putting pressure on CISOs to do more with less. Initiatives should be...
Access our technical support hub to view our support packages and how to get help