We use the solution for network admission control. It manages the admission of endpoints to the networks.
Firstly, I like the stability. Secondly, the ease of deployment— it's not complex. Thirdly, there's a great support team that becomes actively engaged whenever we encounter issues. Their technical support is amazing. Fourthly, good documentation is available. We have detailed information about the product.
For sales purposes, the product has limitations. It does not support the TACACS+ protocol. This creates a need for another product to work with.
I have been using this solution for the past two and a half years.
The product is stable. Once you deploy it, you don't need to touch it again.
The solution is highly scalable. I currently use it for corporate use within my company and for other clients. We have three to four engineers for deployment and maintenance tasks.
We have rarely contacted customer service and support, as the website is straightforward.
The initial setup was straightforward and not complex. The deployment process took six weeks. It's shorter than the typical six months for similar products.
The deployment process involves an initial assessment, checking the security policy against the required tasks, preparing the network for deployment, and then the deployment itself.
I recommend using the solution because it gives verified control over the environment. It has a great visibility feature. Also, it gives visibility on what's happening on the network. Proceed with the prerequisites, particularly the initial assessment. It has to be conducted properly. Otherwise, the solution might not follow a straightforward path.
The first step is the initial assessment, followed by the second step of collecting clear requirements. Clarity in requirements is crucial because the solution can be directed in any direction you tell it to go. Therefore, you need to know exactly what you need to do. Overall, I rate the product a nine out of ten.
Technology improved network security via access layer L2.