Network Access Control


Bradford’s Network Sentry




Bradford’s Network Sentry™ greatly enhances security and
automates IT operations, enabling organizations to effectively
manage security policies and secure critical IT assets.


Bradford’s Network Sentry™ network access control solution integrates with IT infrastructure
and correlates network, security, endpoint device, and user information to provide total visibility
and control over every user and device accessing your network.


Easily integrated into existing network environments, Network Sentry’s out-of-band architecture
leverages the inherent security capabilities of existing network equipment along with
authentication and authorization technologies such as 802.1X, RADIUS and Active Directory
for identity management. By leveraging existing technology investments, organizations can
quickly add advanced visibility and security capabilities to their current networks and avoid the
need for expensive forklift upgrades or the scalability and management challenges of adding
in-line equipment.


Through an easy-to-use web interface, Network Sentry provides powerful administrative tools
for managing network and security operations. Its inherent flexibility lets IT organizations
gracefully evolve their security projects from initial trials to pilot rollouts to full deployments to
ensure effective security policy implementations with minimal impact on user experience.


Network Sentry can be deployed either on a dedicated hardware appliance, as a virtual
appliance or “in the cloud” via SaaS (Security-as-a-Service). The same functionality is
delivered in all deployment models ensuring that Network Sentry can adapt to the unique
needs of any network environment.


Network Infrastructure Visibility

Knowing the makeup of your constantly changing network, switches, routers, hubs, and wireless access points, is fundamental to making sure it is secure. Network Sentry provides a real-time view of your dynamic network infrastructure ensuring that you can detect and prevent any changes that would introduce risk.

Device Profiling and Fingerprinting

With the proliferation of personal and mobile computing devices in organizations, the diversity and the ownership of the devices is difficult to manage. Network Sentry helps to identify and classify each type of device on your network, identify if it is corporate issued or employee-owned, and identify the user on the device to enable role-based network access policies.

Endpoint Compliance

The average number of devices per user is on the rise. This phenomenon also increases the attack surface of your network. Ensuring the integrity of wired and wireless devices before they connect to your network minimizes the risk of vulnerabilities and the spread of exploits and malware. Network Sentry, with agentless, dissolvable agent, or a persistent agent, validates the endpoint’s configuration as it tries to join the network. If the configuration is not compliant (i.e. patch missing, outdated antivirus, jailbroken device) then connections can be prevented or users can be warned until the endpoints are remediated.

Network Provisioning

Segmenting a network and classifying data are two best practices for data protection. Network Sentry, with role-based access control policies, ensures the right users on the right devices gain access to the right set of network segments. Users on corporate issued devices, because they are centrally managed by IT, may have more access on corporate issued devices than personally owned devices.

Guest Management and Self-Registration

Managing the onboarding of guests and employee laptops, tablets, and smartphones to your network, can be a labor intensive and error-prone task. Network Sentry simplifies onboarding by streamlining registration processes. Onboarding of guests can be delegated to deputy onboarding administrators and, when appropriate, users can self-register their own devices shifting the workload from IT to the end users.


Configuring an endpoint such as a laptop, tablet, or smartphone, for wireless access can be a challenging task. Even with will documented steps for end users, the process can be error prone frustrating the end-user and the staff that take the support calls. Network Sentry’s EasyConnect feature allows organizations to immediately and securely connect personal or corporate issued wireless devices to your network. EasyConnect automatically sets device security configurations, encryption type and other critical security settings on the user’s device, automating the onboarding process and removing the challenge.


Bradford’s Network Sentry™ Network Access Control Systems integrate with IT infrastructure and correlates network, security, endpoint device, and user information to provide total visibility and control over every user and device accessing your network.


If you are interested in receiving a quote for a Network Access Control Appliance, please submit information on the Quote Request Form on the right side of this page and one of our sales representatives will provide you with a Bradford Networks Price.