Your key for transparency and oversight in the network

scroll down

Network Access Control

Central intelligence in the network

Whether a member of staff or as a guest, from within the office or on the road, wired or wireless:

Everyone is give the appropriate secure access to your network.

And you keep an eye on things at all times.


Contact us!

Products features

Policy enforcement

USP Network Authentication System® automatically and reliably enforces network access policies. For both LANs and WLANs.



Real-time view of the network

For full transparency: USP Network Authentication System® gives you a real-time view of your network so that you can know which devices are currently connected to the network.



Endpoint compliance

Only devices complying with the company's guidelines are given access to operational IT resources. Devices not complying with the guidelines are automatically moved into a quarantine zone.

End device profiling

End devices are identified and categorised by their communication behaviour. This simplifies the administration of end devices and reduces operating costs.



End device authentication

Devices newly connected to the network are detected by USP Network Authentication System® and authenticated by MAC and/or 802.1X. This is how you can make sure that only authorised devices gain access to the network.



VLAN management

Automatic assignment of terminal devices to suitable network zones such as a guest network, quarantine or an internal network.




USP Network Authentication System® provides comprehensive solutions for monitoring and transparency of the network - even with the mobile devices and WLANs so prevalent these days. Thanks to the modular structure of the product, the USP Network Authentication System® can be precisely adapted to customer needs.

Transparency and monitoring in the network

What devices are active when on your network? Get an up-to-date view of the devices connected to the network at all times. Comprehensive reporting options at the press of a key. More...

Automatically into the right network

Automatic assignment of end devices to appropriate network zones: all devices are directed to the appropriate network segment for them on the basis of their features with the application of your company's network access guidelines. More...

Mobile devices & BYOD

Enable secure network access using mobile devices, whether they are personal or company devices. More...

Protection against foreign devices in the network

Devices newly connected to the network are detected. Only known devices are granted access to the network. Unknown or foreign devices are blocked or moved into the quarantine area, where they can do no damage.

Guests network

Guests in meeting rooms or publicly accessible areas wishing to use the guest WiFi log in to the captive portal themselves in accordance with the law by text message or voucher. More...

LAN and WLAN under one roof

USP Network Authentication System® permits central enforcement of network access policies for wired and wireless accesses. More...


Health service

Hospitals and clinics are using USP Network Authentication System® to cover the wide range of requirements on hospital networks. Simple network access for doctors, care staff, patients and visitors and the highest levels of confidentiality of patient data.



Banks do not compromise when they are dealing with the confidentiality, reliability and integrity of customer data. This is why they turn to United Security Providers' network access control solution – and hence to 100% Swiss-made software.



By implementing network access control, multinationals bring transparency and monitoring into their global network, thereby protecting their business secrets.



Easy to use

The USP Network Authentication System® has an intuitive user interface and is available to users in German and English.


The reporting functions in the USP Network Authentication System® are easy to use in your browser. Create individual reports for all needs. With a search function, filter options applying wide-ranging parameters, scheduled reports and much more.

Role-based system

Seven different roles provide each user with simple access to the functions he needs and allow a logical distribution of responsibility, authorisation levels and areas of responsibility.

Network Access Control - try it for free

Extremely pioneering – USP Network Authentication System®

Testen Sie unseren besten Schutz für Ihr Unternehmensnetzwerk. Laden Sie mit wenigen Klicks das USP Network Authentication System® Testpackage herunter.

Network Access Control rasch implementiert und einfach im Betrieb. Überzeugen Sie sich selbst. Mit der kostenlosen Testversion.

Try it for free now!

Contact Person

Tobias Aebi
NAC Consultant

T +41 31 959 02 29
E-Mail tobias.aebi(at)


Bellow you'll find further information on the subject Network Access Control and on our USP Network Authentication System®.

to the downloads