České Radiokomunikace

Network Access Control: Network security starts with user connectivity

Full visibility of all devices connected to your network, policy-based access control, and automated responses to security risks

Network Access Control (NAC) acts as an uncompromising guardian of your corporate network: it checks the devices connected to it, their permissions, and their movement within the network, minimising security risks and ensuring full control over network access.

Access control and network protection

Device identification and authentication
Device identification and authentication

Each connecting device is securely authenticated and identified first. Unknown or high-risk devices are prevented from connecting to the network.

Centralised access policy management
Centralised access policy management

Access is defined and managed centrally based on the user, device, and single-point connection context.

Automatic network segmentation
Automatic network segmentation

Devices are automatically assigned to segments, e.g. corporate, guest, IoT. This increases security, traffic control, and overall network visibility.

Continuous security assessment
Continuous security assessment

Real-time monitoring and validation of device security posture, with automated responses to non-compliance with access policies.

Broad support for authentication methods
Broad support for authentication methods

Compatibility with multiple access protocols, such as 802.1X or MAC authentication, ensuring maximum flexibility.

Support for regulatory compliance
Support for regulatory compliance

Auditable access logs and detailed visibility into network activity support compliance with NIS2 and other security standards.

Service portal
Service portal

Clear dashboards provide real-time information on infrastructure status, authentications, connected devices, licence consumption, and more.

Reporting
Reporting

Regular reports covering all key events within the network.

Choose your operating scenario

  • „S“ Essential
    • Single control node option (Publisher).
    • Basic service instance operated in CRA’s or the organisation’s cloud.
    • Recommended for organisations with up to 1,000 authenticated devices.
  • „M“ Professional
    • Option with one control node (Publisher) and one replication node (Standby Publisher).
    • Redundant service architecture with automatic switching in case of an outage.
    • Recommended for organisations with up to 5,000 authenticated devices.
  • „L“ Enterprise
    • Option with one Publisher-type control and replication node, and the possibility of multiple Subscriber nodes.
    • Highly scalable solution for multiple sites, with a geo-redundancy option.
    • Recommended for organisations with up to 15,000 authenticated devices.
  • „XL“ Mission Critical
    • Service architecture defined according to the organisation’s individual requirements.
    • Recommended for organisations with more than 15,000 authenticated devices.

We hold the necessary certificates and security is our top priority

  • Physical security
    Physical security at BT3 level in accordance with the methodology of the National Security Authority (NBÚ).
  • Proven technologies
    We use and offer only proven and up-to-date technologies.
  • Active support
    We provide 24/7 active support.
  • ANSI-TIA942
    The technology is operated from an ANSI-TIA942 certified DC TOWER data centre
  • Common Criteria Certification for Information Technology (IT) Security (ISO/IEC 15408)
    Certification at CC EAL 4+ level
  • ISO 9001
    Quality management systems
  • ISO 14001
    Environmental management systems
  • ISO 19011
    Standard for the certification of internal auditors
  • ISO/IEC 20 000-1
    Information technologies – Service management system requirements
  • ISO/IEC 27001
    Information security management systems
  • ISO/IEC 27017
    Information technologies – Security techniques – A set of guidelines for cloud environment security and for minimising the potential risk of security incidents
  • ISO/IEC 27018
    Information technologies – Security techniques – A set of procedures for the protection of Personally Identifiable Information (PII) in public clouds acting as PII processors
  • SOC Type 1 and Type 2
    SOC 2 Type 1 and Type 2 certifications, issued in accordance with American Institute of Certified Public Accountants (AICPA) standards and requirements, cover information management and security in organizations
  • ISO 50 001 
    Energy management systems
  • PCI-DSS 
    Compliance with the requirements of PCI-DSS for data centre operators
  • NBÚ
    Certificate for access to classified information up to the classification level ‘CONFIDENTIAL’
  • GDPR compliance
    The infrastructure is fully compliant with GDPR requirements

Network Access Control in detail

  • Historically, local networks were considered trusted environments. NAC reflects today’s reality, where Wi-Fi devices, BYOD, IoT elements, external users, and even compromised endpoints routinely connect to internal infrastructure, making the assumption of trust obsolete.
  • The core NAC principle is ‘verify the identity and posture of the device before granting it access’. It goes far beyond a simple Wi-Fi password, validating who is connecting, from what device, and whether they meet security requirements.
  • What does NAC control? User and device access, their network placement and permissions. NAC is not used primarily for blocking access, but for network segmentation and controlled limitation of device movement.
  • NAC significantly reduces the risk of an attacker proceeding to compromise other systems, accounts, and networks after breaching a network and gaining initial access to it.
  • NAC is not an antivirus, EDR, or attack detection tool. It is a tool for defining and enforcing access policies based on your rules.

Aruba ClearPass, as the core component of the service, acts as the Policy Manager responsible for user and device authentication. It determines what level of access an employee, guest, printer, or camera receives.

The service architecture distinguishes the roles of ‘Publisher’, ‘Standby Publisher’, and ‘Subscriber’. These represent individual nodes within a multi-instance ClearPass environment – typically in an HA cluster or a distributed environment. Publisher is the primary (control) node in the ClearPass cluster, hosting the main Policy Manager database. It is responsible for managing the configuration, licence, and setup replication to Subscribers and authentication.

Subscriber (Standby Publisher) is a replication (subordinated) node that downloads configuration from the Publisher. It supports authentication scaling (e.g. across multiple sites) and provides failover functionality in the event of an outage of the main node. Like the Publisher, a Subscriber can process authentications and enforce access policies.

As a virtual appliance, ClearPass can be operated in CRA’s cloud environment, in the organisation’s environment, or in a public environment, such as Microsoft Azure or Amazon AWS.

With this service, we can authenticate devices such as PCs, laptops, mobile devices, APs, printers, and BYOD devices. Authentication can be performed via switches, APs, ClearPass, or Active Directory.

The service provides multiple authentication methods, including 802.1X, MAC Authentication, and TACACS+ / RADIUS, and integrates with a wide range of security products from various vendors (e.g., Active Directory, MDM, firewalls, SIEM).

NAC can be deployed in classic metallic LAN networks, Wi-Fi networks, as well as in remote access networks.

  1. Identification and authentication. Each network access attempt is automatically analysed:
     
    • User (identity verification),
    • Device (type, operating system, and fingerprint),
    • Connection location and method,
    • Device security posture.
  2. Policy evaluation. Based on defined security policies, the system decides:
     
    • Whether access will be granted,
    • To what extent,
    • Or whether the device will be restricted or denied entirely.
  3. Dynamic control and response:
     
    • Access rights can be changed in real time.
    • The system dynamically segments the network, isolates high-risk devices, and can automatically respond to security incidents.

NAC can be delivered in two functional variants across all deployment scenarios. The basic, Standard option, provides core functionality, i.e., access policy analysis and authentication, checking who connects, from what device, and to which resources.

The enhanced, Advanced option, adds device security posture checks before and during network access. It detects whether an antivirus is active and up-to-date on the device, and decides about granting network access accordingly.

All devices within an organisation’s network must be operated under the same variant, meaning that the Standard and Advanced options cannot be combined in a single service package.

Tato část je určená k ochraně proti spam robotům. Vidíte-li tento text, vyplňte pole uvedené za otázkou. Tlačítko jsem robot ignorujte.
Kolik je dvě plus tři

Contact us

Others also read

Data centres
Data centres
With your servers and other IT equipment placed in a data centre, you retain full control of your equipment while securing space to run it with a high degree of availability.
Cloud
Cloud
A modern and safe solution for your company’s IT infrastructure. With our cloud service, you will obtain unlimited computing power with guaranteed high availability and redundancy of the entire architecture. The VIRTIX self-service cloud portal is available for easy and fully automated management of all services.
Telco and infrastructure
Telco and infrastructure
Connectivity from CRA offers high quality connection of sites to the internet, with uninterrupted availability. This ensures that services, information, and multimedia content reach your clients in a reliable and timely manner.
IoT - Internet of Things
IoT - Internet of Things
Connect your devices, sensors, meters, and other elements directly from the field to your application or system using our LoRaWAN infrastructure. CRA’s IoT Cloud is an ideal and universal platform for an integrated IoT multi network with huge synergy potential.
AI Cloud
AI Cloud
Artificial intelligence as a service With artificial intelligence (AI), companies and organisations achieve greater work efficiency, save on administrative costs, and get a better customer experience as well as support for analysis, planning, and decision-making. AI Cloud as a service will bring you both the space for running your own AI solutions and a range of pretrained AI models ready for a variety of applications.
Streaming and OTT services
Streaming and OTT services
Digital TV and multimedia services are not just about content. For example, processing a video and delivering it to the recipient in a way that meets contemporary requirements is quite challenging. České Radiokomunikace’s streaming and OTT services – Media Cloud and HbbTV – offer very cost-effective solutions for multimedia services based on a unique cloud infrastructure.