Secure Network Access for BYOD, Guest Users and IT-Owned Devices

About Cloudpath

Cloudpath Enrollment System is a software/SaaS platform that delivers secure wired and wireless network access for BYOD, guest users and IT-owned devices. It streamlines getting devices on the network and secures every connection with powerful encryption. Cloudpath software gives you granular policy control over what network resources users can access. It lets you deliver a great end-user experience and virtually eliminates helpdesk tickets related to network access. Choose from cloud-based or virtualized on-premises deployment. Cloudpath software supports any user, any device, and any network infrastructure.

Cloudpath Overview

From employees to visitors, from IT-owned assets to personal devices, Cloudpath ES provides a simple approach that unlocks the power of certificate-based Wi-Fi for an interruption-free user experience without the need for IT assistance.

The built-in portal allows users to on-board a wide array of new devices in a self-service, automated manner. With support for issuing certificates via the built-in certificate infrastructure and from existing Public Key Infrastructure (PKI), such as Microsoft CA, Cloudpath Enrolment System allows you to mix-and-match to meet your needs.

Plus, the rich policy controls in Cloudpath ES ensure that every device is uniquely identifiable, provisioned with the appropriate certificate, and has the appropriate policy applied. Policies can be built using traditional mechanisms, like Active Directory and group mapping, along with powerful new mechanisms, including Google Apps for a seamless Chromebook experience.

Cloudpath – Secure BYOD

Simple, Secure, Scalable BYOD

The challenges involved in BYOD include security, usability, and differentiation of personal devices from corporate-issued devices.

The Cloudpath Enrolment System provides automated, self-service access to the secure wireless network for employees authorized to use BYOD devices. Authorization may come from a variety of sources, including authentication via Microsoft Active Directory.

Once authorized, the device may be given access indefinitely or for a period of time along with additional policy options based on WPA2-Enterprise, including dynamic VLAN, access control list (ACL), and/or bandwidth assignment.

The network administrator benefits from knowing that all wireless users are secure and that personal devices have been segregated from IT-owned assets. The network administrator also gains visibility and control on a device-by-device basis.

A New Spin on Guest Access

Cloudpath Enrolment System makes it incredibly simple to extend secure Wi-Fi to visitors of all varieties. Cloudpath Enrolment System goes beyond traditional guest servers by on-boarding guests onto WPA2-Enterprise wireless networks without IT involvement.

With set-it-and-forget-it simplicity, Cloudpath Enrolment System provides unmatched ease of guest on-boarding while providing the network administrator visibility and control over who is granted network access.

IT-Owned Assets

Today, the need to provision thousands of IT-owned mobile devices, from iPhones to Chromebooks, is a consistent challenge. IT-based provisioning scales poorly when dealing with large numbers of devices or geographically dispersed populations.

Cloudpath ES provides the ability to transform the provisioning process and provide a user driven, self-service provisioning process. Based on your policies, these IT assets may be given the appropriate network access without IT ever touching them.

Cloudpath Enrollment System

Increase Security for Users, Devices, Data and the Network

Cloudpath software secures network connections with WPA-2 Enterprise—the highest standard in secure Wi-Fi. The system encrypts data in transit between the device and Wi-Fi access points for maximum security. It lets you define and manage polices for network access so that users see only what they should see. You gain visibility and control over what devices are on the network, and the power to revoke access at any time. A device posture check with remediation during onboarding ensures that only devices with appropriate security safeguards in place gain access.

Streamline Network Access for BYOD Users

The sheer volume and diversity of devices that require network access can cause headaches for IT departments. What if BYOD users could self-provision their devices with intuitive self-service workflows? With the simple onboarding portal in Cloudpath software, they can. Users get a great experience without IT intervention. BYOD users initially gain access with existing login credentials. The system installs a digital certificate on the device so that users authenticate seamlessly from that point forward—without having to re-enter a Wi-Fi password.

Give Visitors Easy, Self-service Guest Wi-Fi

No matter what the environment—schools, colleges, hotels, public venues, or anywhere, really—the first thing visitors ask is “How do I get on the Wi-Fi?” Cloudpath software delivers secure guest access for visitors without involving the IT helpdesk. Guest users simply self-register for internet access via an intuitive portal and receive login information via SMS, email, or printed voucher. You can customize the login portal, guest workflows, terms and conditions, and more for a trouble-free and secure user experience.

Solution Portfolio

Find out about all our technology partners

Industries We Work With

Find out about all the industries we work in and how we may be able to help you

Latest News

Ruckus Networks R750 Access Point Now WiFi 6 Certified

Ruckus Networks (now part of CommScope via acquisition) today announced that the R750 802.11ax indoor Wi-Fi® access point (AP) for ultra-dense client environments is Wi-Fi CERTIFIED 6™ from the Wi-Fi Alliance. This certification further validates the applicability of...

Palo Alto Networks an Eight-Time Gartner Magic Quadrant Leader

In any high tech industry, it’s not often that a company gets to define a new market, and then continue to expand and reshape it for more than a decade. It’s even less common in our highly competitive cybersecurity space. Maybe that’s why this year’s Gartner Magic...

Technical Support

Access our technical support hub to view our support packages and how to get help

Predictive, Pre-Deployment, Post Installation and Health Check Wireless Surveys carried out by certified wireless engineers.

IP-CCTV site survey to assess camera locations and requirement and existing Mobotix solution health checks.

Net-Ctrl provide network and structured cabling solutions as either a stand-alone installation, or to compliment products and solutions that we offer.

Net-Ctrl offers our Cloud WLAN. Delivering market-leading patented technology managed by the Net-Ctrl engineering team.