RUCKUS Cloudpath
Security and Policy Management Platform
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
More pricing below, click here!
Please Note: All Prices are Inclusive of GST
Overview:
RUCKUS Cloudpath Enrollment System (ES) software is a security and policy management platform that enables IT to easily and definitively secure the network, secure users and secure wired and wireless devices. Cloudpath software consolidates and simplifies the deployment of multiple services that are typically disparate and complex to manage: Certificate Management, Policy Management and Device Enablement.
The only integrated security and policy management platform that delivers:
- Cloud-managed deployment option
- Multi-tenancy
- User-based licensing, not device-based
- Pre-boarding (remote automated onboarding)
- Chrome extension to automate Chromebook onboarding
In the Cloudpath architecture, new devices join the network via open SSID or wired connection, at which point the user is redirected to the Cloudpath ES portal. Cloudpath software authenticates and authorizes the user; then configures the device with a certificate or a profile and secure networks. The software then moves the device to the secure SSID or the secure wired network. The device authenticates using the certificate or installed profile and Cloudpath software processes the RADIUS authentication.
Devices may also enroll over the web; allowing users to activate devices at a physically separate location. Devices then securely join the network when in its vicinity. Cloudpath is available as both an on-premises virtual instance or as a cloudmanaged deployment, each with equivalent functionality.
Comprised Of:
- An all-inclusive license package
- User-based license which includes all features
Deployment Options:
- On-site virtual server
- Public cloud-managed instance
License Options:
- Enterprise perpetual
- 1-year subscription
- 3-year subscription
- 5-year subscription
- Education licenses
- White Glove Service (remote deployment)
License Includes:
- Maintenance and support
- Reporting
Put passwords in your rear-view mirror
Cloudpath ES software includes a built-in, comprehensive Certificate Authority (CA) that enables any IT department to create and manage its own Public Key Infrastructure (PKI). With PKI, your organization is protected by the gold standard in wireless security: WPA-2 Enterprise via X.509 certificates. Passwords are just a memory.
Network access control: it's a must
Certificates are one part of the Cloudpath security equation. Policy-based access control is the other. Cloudpath ES software lets IT associate each device with a user; then establish fine-grained policies for both. The software works together with policy enforcement points to make unauthorised access and persistent bad behavior a thing of the past.
Now, about those BYOD devices
Just getting devices securely onto the network is half the battle for IT; BYOD adds more time and complexity. What if users-even bring your own device (BYOD) users-could self-onboard any and all of their devices? With the simple onboarding portal in Cloudpath ES, they can. IT can control the types of devices that are allowed access and ensure the requisite on-device enforcement, all while seeing a dramatic reduction in service and trouble tickets.
The missing link: guest access
You've secured owned and BYOD devices but what about guests and their devices? Cloudpath software includes comprehensive guest access functionality that secures guest devices just as easily and thoroughly as the rest, while providing abundant authentication options. And Cloudpath software is infrastructure-agnostic, so no matter the environment, you can treat all of your guests the same-or differently.
Certificate Management
Cloudpath ES software includes a built-in, comprehensive Certificate Authority (CA) that enables any IT department to create and manage its own Public Key Infrastructure (PKI). A built-in RADIUS server and user database greatly simplifies installation and setup and helps in tying policies with certificates. In addition to built-in capabilities, APIs and other mechanisms enable Cloudpath software to easily integrate with existing external CA, RADIUS and user database infrastructures.
Policy Management
Cloudpath ES software provides IT with a simple, workflow-based policy management portal that can be used to establish granular policy-based access control for all users and all devices. The policy engine identifies client and user privileges and applies the correct policies to each user and each device. The software works together with policy enforcement points to ensure policies are properly exercised.
Device Enablement
Cloudpath ES software makes possible portal-based, self-service onboarding for end users and their devices and further enables pre-boarding for users and devices prior to their arrival at a given location. To ensure the network is properly protected, administrators can control which devices are allowed to join the network and can ensure the requisite on-device enforcement, such as enabling a firewall, installing certain applications, or updating anti-virus software.
Features:
Certificate Authority
- Support for both "user" and "device" certificates
- Certificates improve network security by replacing unsecure approaches: passwords, pre-shared keys and MAC authentication
- Multiple certificate sources including built-in Public Key Infrastructure (PKI), Microsoft CA and InCommon
- In multi-tenant mode, enables a unique CA for each tenant
- Certificate Templates for tying policies and certificates
Secure Access
- Devices connect over secure WPA2-Enterprise via 802.1x authentication with EAP-TLS, PEAP access methods
- Supports all wired and wireless devices, including IoT (headless) devices
- Supports employees and guests as well as employee-owned, BYOD devices
WPA2-Enterprise (802.1X)
- Client Authentication
- Over-The-Air Encryption
- Network Authentication
Access Control
- Push dynamic Access Control Lists (ACL) to wired or wireless infrastructure via RADIUS Vendor-Specific Attributes (VSA)
- Perform automatic device posture check and remediation via dissolvable/temporary agent, ensuring that all devices seeking access meet minimum requirements
- Supported posture check includes checks for the latest OS patches, antivirus and antispyware packages with current definition file variables (e.g., version, date), anti-malware packages, registry settings (e.g., key, value), patch management, PIN-lock on mobile devices, application presence, firewall settings and more.
Self-service Onboarding With Pre-boarding
- Simple workflow for user policy creation, customizable look-and-feel and branding for self-service onboarding portal which enables end users to easily manage their own access and devices, removing that burden from IT
- Pre-boarding enables end users to onboard their device(s) from anywhere they can access the internet, such as home or hotel, before arriving onsite to access the network.
- Filters enable location-policy or dynamic policies during onboarding
- Supports enterprise-owned device onboarding, BYOD onboarding and guest device onboarding
Policy Management
- Implement granular per-user, per-device policies such as VLANs and application-based access to ensure a secure, well-performing network
- Administrative portal allows IT to easily construct arbitrarily complex access policies
- Via APIs, Cloudpath software easily and automatically integrates with policy enforcement points such as switches, firewalls and content filters
Guest Access
- Extend secure Wi-Fi to visitors of all varieties, onboarding guests onto WPA2-Enterprise wireless networks without IT involvement
- Implement a variety of traditional authentication and authorization options, including sponsorship and self-verification, as well as integration of secure Wi-Fi with external identity services, such as Google, Facebook, and LinkedIn
- Tracks guests across the network for security and compliance demands and full guest auditing. Time limits, account expirations, and SMS verification offer additional security controls.
Reporting
- Provides granular visibility into users and devices accessing the network, when they access, how they access and how long they access
Chromebook Integration
- Distribute certificates to managed Chromebooks using the Google Admin Console. A Cloudpath extension detects Chromebook authorization, automatically queries the certificate and installs it in the Chromebook Trusted Platform Module (TPM).
- Enables initial Chromebooks setup via user-driven, IT-driven, or distributor-driven approaches
Specifications:
RUCKUS Cloudpath Enrollment System v5.0 | |
---|---|
Deployment options |
|
Redundancy and Multitenancy |
|
Certificate Infrastructure (PKI) |
|
RADIUS |
|
Onboarding |
|
Visibility and Reporting |
|
Authentication and Protocol |
|
User Identity Support |
|
Device Support |
|
SMS and Email |
|
Video:
RUCKUS Cloudpath ES
How to Buy:
Subscription
- Licensed by user, not device
- Total user count tiers provide voume discount
- User license quantity will dictate # of servers (1, 2, 4 & option to add more for scalability)
- Separate list price for Education (worldwide)
Perpetual License
- Licensed by user, not device
- Total user count tiers provide voume discount
- User license quantity will dictate # of servers
- Separate list price for Education (worldwide)
Ordering Guidance
- Determine if you are looking for a cloud or on premise solution and if a subscription or perpetual license is desired.
- Determine the number of users (not devices) in your environment including guests.
- Choose the SKU that is most appropriate based on subscription duration and user count.
- Add optional white glove service for remotely assisted deployment
Documentation:
Download the RUCKUS Cloudpath Datasheet (PDF).