Network access control

Ikusi’s cybersecurity solution applies granular policies based on user and device information, assigning access privileges to people according to their role within the organization. In this way, cybersecurity risks are avoided, since it gives restricted access to guests and monitored access to interns.

The solution provides secure access to the network, through authorizations based on the information obtained from the different access elements such as switches, wireless network controllers, VPN concentrators, and user identity repositories, based on the identity of the user, type of device, method and time of access.


  • Authorization monitoring of people who access the network and isolation of computers that represents a risk
  • Checking that the computers that connect to the network comply with the security requirements imposed by the company
  • Easy management of guest connections
Request information
This field is for validation purposes and should be left unchanged.