The device itself can be configured and deployed in a short amount of time. Depending on the specific model that's purchased, one can monitor an exponentially larger number of hosts and network segments. After a quick installation using a console port, the device begins discovering endpoint devices, ultimately deciding which hosts should have access depending on the policies set. The solution either grants or denies access and sends alerts to the appropriate staff when a device does not meet the compliance profile. The solution mainly uses the Common Vulnerability Enumeration (CVE) system and malware compliance checks to determine whether a host should be allowed to connect or not. The device then labels the type of compliance checking that needs to be continuously done on the endpoint by assigning it varying states of "clean." Or it determines whether the device should be continuously scanned. Remediation is performed through alerting and a ticketing system in the solution's workflow module.
Although the performance is fine and the device performs well, the look and feel of the solution is a bit unpolished.
Documentation for Veri-NAC is adequate. The system itself has a help file on the appliance, as well as some PDF documents. The website has videos, datasheets and whitepapers available. Basic support is included on the site and is comprised of phone and email assistance, as well as a web portal and other helpful information. Overall, the solution is available at a great price point for small or midsized businesses that have the existing network technology to take advantage of a solution such as Veri-NAC.