Customers with BYOD policies can implement it through social media logins, token-based authentication, or DPSK. When users access the network as guests or with BYOD, they have the option to authenticate against Active Directory. However, it's important to note that in this case, users are authenticated against AD but do not receive a certificate. Integrating guest access through the product has been a fairly simple process. We have options for guest access, DPSK access, and social media access. Guests can request and receive a pre-shared key from a set of administrators. Social media integration is particularly convenient, as it allows integration with platforms such as LinkedIn, Facebook, and Microsoft, which is a current project I'm working on with one of our customers. Our customers are enterprise businesses. I would advise thoroughly understanding customer requirements and conducting research for the most suitable implementation. Utilize the workflows provided by Ruckus Cloudpath instead of opting for standard onboarding. When deploying it, ensure that firewall rules are properly configured and open on your firewall, as firewall issues can significantly delay deployments. I rate the overall product a seven out of ten.
Account Manager at a computer software company with 11-50 employees
Reseller
2021-09-10T15:47:01Z
Sep 10, 2021
We're a reseller. I'm not sure which level. They've got different levels usually, however, we've been doing a good bit with Ruckus. Not a huge amount - just a good amount with Ruckus and especially in the wireless area. Now, the switches are starting to come into play with us. With Cisco, we've been a partner and we're not at a super high level with Cisco. We're a small company. That said, they give some TLC, to an extent, and sometimes we'll get leads from them. They're a good partner and we can get some good discounts when we register for our customers. I would give them a rating of about an eight out of ten. It's not quite Cisco, however, it's excellent in general.
My advice for those wanting to implement this solution is to make sure to do good on-site field surveillance, and based on the information, identify which type of deployment to use. For example, which application and terminals are going to be used for good coverage with this solution. I rate Ruckus Cloudpath a nine out of ten.
Assistant Manager-Presales at a tech services company with 11-50 employees
Reseller
2021-03-18T19:34:44Z
Mar 18, 2021
The solution has all the training of Cloudpath integration with a controller over their training sites and on YouTube. They provide information on videos about the climate of Cloudpath with the controller as well as the third parties. Anybody who would want to use the solution can access information about it from these platforms. I would recommend the solution to other users because it is price competitive and well-featured. I rate Ruckus Cloudpath an eight out of ten.
What is network access control (NAC)? Network access control (NAC) is a type of security software solution that controls who can access a network and in what capacity. These security solutions provide network visibility and access management by enforcing the security policies on connected devices across the network.
Customers with BYOD policies can implement it through social media logins, token-based authentication, or DPSK. When users access the network as guests or with BYOD, they have the option to authenticate against Active Directory. However, it's important to note that in this case, users are authenticated against AD but do not receive a certificate. Integrating guest access through the product has been a fairly simple process. We have options for guest access, DPSK access, and social media access. Guests can request and receive a pre-shared key from a set of administrators. Social media integration is particularly convenient, as it allows integration with platforms such as LinkedIn, Facebook, and Microsoft, which is a current project I'm working on with one of our customers. Our customers are enterprise businesses. I would advise thoroughly understanding customer requirements and conducting research for the most suitable implementation. Utilize the workflows provided by Ruckus Cloudpath instead of opting for standard onboarding. When deploying it, ensure that firewall rules are properly configured and open on your firewall, as firewall issues can significantly delay deployments. I rate the overall product a seven out of ten.
I recommend this solution to others and rate it a nine out of ten.
I rate the solution an eight out of ten.
We're a reseller. I'm not sure which level. They've got different levels usually, however, we've been doing a good bit with Ruckus. Not a huge amount - just a good amount with Ruckus and especially in the wireless area. Now, the switches are starting to come into play with us. With Cisco, we've been a partner and we're not at a super high level with Cisco. We're a small company. That said, they give some TLC, to an extent, and sometimes we'll get leads from them. They're a good partner and we can get some good discounts when we register for our customers. I would give them a rating of about an eight out of ten. It's not quite Cisco, however, it's excellent in general.
My advice for those wanting to implement this solution is to make sure to do good on-site field surveillance, and based on the information, identify which type of deployment to use. For example, which application and terminals are going to be used for good coverage with this solution. I rate Ruckus Cloudpath a nine out of ten.
The solution has all the training of Cloudpath integration with a controller over their training sites and on YouTube. They provide information on videos about the climate of Cloudpath with the controller as well as the third parties. Anybody who would want to use the solution can access information about it from these platforms. I would recommend the solution to other users because it is price competitive and well-featured. I rate Ruckus Cloudpath an eight out of ten.