{"id":4652,"date":"2023-04-20T11:40:00","date_gmt":"2023-04-20T11:40:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2017\/07\/07\/infoexpress-cybergatekeeper-nac-product-overview-and-insight\/"},"modified":"2023-06-06T15:53:56","modified_gmt":"2023-06-06T15:53:56","slug":"infoexpress-cybergatekeeper","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/","title":{"rendered":"InfoExpress CyberGatekeeper: NAC Product Review"},"content":{"rendered":"\n<p>InfoExpress CyberGatekeeper has expanded into a series of products marketed under three brands, but always with the promise of rapid, uncomplicated installation and integration. These products enable IT teams to quickly deploy network access control (NAC) security easily and with full internal control.<\/p>\n\n\n\n<p><em>To compare Infoexpress CyberGatekeeper against their competition, see the complete list of <a href=\"https:\/\/www.esecurityplanet.com\/products\/network-access-control-solutions\/\">top network access control (NAC) solutions<\/a>.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Who Is InfoExpress?<\/h2>\n\n\n\n<p>Based in Santa Clara, California and founded in 1993, the privately-held InfoExpress is a <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">network security<\/a> company that specializes in enterprise-grade network access control solutions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is CyberGatekeeper?<\/h2>\n\n\n\n<p>InfoExpress\u2019 <a href=\"https:\/\/www.infoexpress.com\/copy-of-cgx\" target=\"_blank\" rel=\"noreferrer noopener\">CyberGatekeeper<\/a> brand is now positioned as a specialized tool to provide dedicated NAC for virtual private networks (VPN) and large area networks (LAN). CyberGatekeeper Remote installs between the remote access point (VPN, secure gateway, etc.) and the corporate network to catch devices that do not conform to the company standards and redirect them for remediation. CyberGatekeeper Server resides within the network and blocks unauthorized connections and quarantines authorized devices that are out of compliance.<\/p>\n\n\n\n<p>However, InfoExpress now primarily sells their NAC products under the Easy NAC brand powered by their CGX Access brand for appliances. <a href=\"https:\/\/easynac.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Easy NAC<\/a> is marketed as a product that provides simplified network access control with quick, but effective installation. The <a href=\"https:\/\/www.infoexpress.com\/copy-of-easynac\" target=\"_blank\" rel=\"noreferrer noopener\">CGX<\/a> Access appliances also can host specialized modules for guest access, bring-your-own-device (BYOD) access, posture compliance, and mobile device management (MDM) integration.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Agents<\/h2>\n\n\n\n<p>CyberGatekeeper can perform agentless scans using integration modules and communicate with users regarding compliance via HTTP redirection. CyberGatekeeper can also deploy the CGX Access agent to Windows, macOS and Linux devices that:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Improves detection from standard network recheck intervals to 10 seconds<\/li>\n\n\n\n<li>Performs direct compliance audits on running processes, registry values, machine names, etc.<\/li>\n\n\n\n<li>Uses a pop-up messages from the agent for end-user compliance messages<\/li>\n\n\n\n<li>Can exercise real time control over device WiFi adapters<\/li>\n\n\n\n<li>Can automatically begin remediation processes<\/li>\n<\/ul>\n\n\n\n<p>Agents install silently and are 10MB or less in size.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Applicable Metric<\/h2>\n\n\n\n<p>The CGX physical and virtual appliances have limits from 300 to 10,000 devices. These approximate capacities depend upon network topology, type of endpoints and enabled features. Multiple appliances can be managed using the Central Visibility Manager to provide higher capacities and no limit is disclosed by InfoExpress.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Security Qualifications<\/h2>\n\n\n\n<p>InfoExpress does not officially satisfy any specific certifications. The basic NAC controls can be used to satisfy many compliance requirements; however, organizations will need to create their own documentation from the available reports.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Features<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Custom rules<\/strong> enabled by the policy builder using information about the user, directory membership, device, location, time, and more<\/li>\n\n\n\n<li><strong>In-band (appliance) and out-of-band enforcement<\/strong> supported through integration with existing wired or wireless network&nbsp;<\/li>\n\n\n\n<li><strong>Network appliance agnostic<\/strong>&nbsp;<\/li>\n\n\n\n<li><strong>Easy integration<\/strong> with many popular security and IT tools such as Bitdefender, Kaspersky Antivirus, ManageEngine Patch Manager, Microsoft Intune, SentinelOne, Sophos, Symantec Endpoint Protection Manager, Webroot, and more<\/li>\n\n\n\n<li><strong>Easy and inexpensive<\/strong> extension of NAC capabilities to remote locations by deploying optional vLink devices so simple that they can be installed by non-IT staff<\/li>\n\n\n\n<li><strong>Self-service portals <\/strong>&nbsp;for guest and BYOD users&nbsp;<\/li>\n\n\n\n<li><strong>Automated reduced access<\/strong> for guests&nbsp;<\/li>\n\n\n\n<li><strong>Automated quarantine<\/strong> for devices out of compliance<\/li>\n\n\n\n<li><strong>Central Visibility Manager<\/strong> provides centralized deployment, distributed license management, administrative privileged management, centralized reporting, and transparent device roaming<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Pros<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Simple and quick<\/strong> to deploy and manage<\/li>\n\n\n\n<li><strong>No network changes<\/strong> required for deployment<\/li>\n\n\n\n<li><strong>Agentless or Agent-based<\/strong> scanning<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Cons<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Confusing branding<\/strong> with multiple sites and names for the same tech<\/li>\n\n\n\n<li><strong>Segregated portals<\/strong> for Guests, Partners, and BYOD<\/li>\n\n\n\n<li><strong>Opaque pricing<\/strong>, licensing requirements, and support options<\/li>\n\n\n\n<li><strong>Lacks features<\/strong> compared to other enterprise options<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Intelligence<\/h2>\n\n\n\n<p>InfoExpress NAC solutions&nbsp; perform automated discovery and integrate with third-party security tools.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Delivery<\/h2>\n\n\n\n<p>CyberGatekeeper deploys as physical or virtual appliances and additional software modules may be deployed on the appliances. To extend the appliance reach to remote locations, additional hardware devices (vLink) deployed to remote locations. For high volume needs, an organiztion will deploy multiple appliances and manage them with the Central Visibility Manager software.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Pricing<\/h2>\n\n\n\n<p>InfoExpress does not directly publish pricing but will offer <a href=\"https:\/\/easynac.com\/compare\/\" target=\"_blank\" rel=\"noreferrer noopener\">free trials<\/a> of their Easy NAC product. Appliances and licensed software may be purchased as a perpetual license with annual support or licensed on a subscription basis.<\/p>\n\n\n\n<p>The pricing for appliances, software, and additional modules depend upon the number of devices being managed. Seven different appliances are currently available:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Access Mini CGXA-S10:<\/strong> Up to 300 devices and 10 subnets, 4 ports<\/li>\n\n\n\n<li><strong>Access 100 CGXA-S100:<\/strong> Up to 2,500 devices and 100 subnets, 8 ports<\/li>\n\n\n\n<li><strong>Access 200 CGXA-S200:<\/strong> Up to 5,000 devices and 100 subnets, 8 ports<\/li>\n\n\n\n<li><strong>Access 500 CGXA-S500:<\/strong> Up to 10,000 devices and 200 subnets, 8 ports<\/li>\n\n\n\n<li><strong>Access 600 CGXA-S600:<\/strong> Up to 10,000 devices and 200 subnets, 10 ports<\/li>\n\n\n\n<li><strong>Access VM ENAC-VM-SMB:<\/strong> Up to 500 devices and 10 subnets<\/li>\n\n\n\n<li><strong>Access VM ENAC-VM-ENT:<\/strong> Up to 10,000 devices and 20 subnets<\/li>\n<\/ul>\n\n\n\n<p>InfoExpress also offers the self-installing vLink appliance to extend CGX Access to remote sites.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Bottom Line: Rapid, Self-Controlled NAC Deployment<\/h2>\n\n\n\n<p>The InfoExpress NAC options can deploy quickly because of their simplified feature set and self-contained appliances. While SaaS deployments may be somewhat faster, InfoExpress NAC solutions provide IT teams with full control over the appliances and their deployment. Organizations favoring control and speed should keep InfoExpress Gatekeeper, CGX Access, and Easy NAC options on their shortlist for consideration and evaluation.<\/p>\n\n\n\n<p><em>This article was originally written by <a href=\"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/\">Drew Robb<\/a> on July 7, 2017, and updated by <a href=\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\">Chad Kime<\/a> on April 20, 2023.<\/em><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6fb05e4101-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6fb05e4101\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6fb05e4101\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6fb05e4101\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6fb05e4101\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6fb05e4101\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6fb05e4101\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The InfoExpress NAC solution automatically discovers devices before granting network access. It is popular with large educational clients.<\/p>\n","protected":false},"author":271,"featured_media":29757,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[17],"tags":[18684,21812],"b2b_audience":[34],"b2b_industry":[],"b2b_product":[378,377,375],"class_list":["post-4652","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-nac","tag-network-access-control","b2b_audience-evaluation-and-selection","b2b_product-endpoint-security","b2b_product-gateway-and-network-security","b2b_product-security-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Infoexpress Cybergatekeeper: NAC Product Review | eSP<\/title>\n<meta name=\"description\" content=\"The InfoExpress NAC solution automatically discovers devices before granting network access. It is popular with large educational clients.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infoexpress Cybergatekeeper: NAC Product Review | eSP\" \/>\n<meta property=\"og:description\" content=\"The InfoExpress NAC solution automatically discovers devices before granting network access. It is popular with large educational clients.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-20T11:40:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-06T15:53:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/infoexpress-cybergatekeeper.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chad Kime\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chad Kime\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/\"},\"author\":{\"name\":\"Chad Kime\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\"},\"headline\":\"InfoExpress CyberGatekeeper: NAC Product Review\",\"datePublished\":\"2023-04-20T11:40:00+00:00\",\"dateModified\":\"2023-06-06T15:53:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/\"},\"wordCount\":867,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/infoexpress-cybergatekeeper.png\",\"keywords\":[\"NAC\",\"Network Access Control\"],\"articleSection\":[\"Products\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/\",\"name\":\"Infoexpress Cybergatekeeper: NAC Product Review | eSP\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/infoexpress-cybergatekeeper.png\",\"datePublished\":\"2023-04-20T11:40:00+00:00\",\"dateModified\":\"2023-06-06T15:53:56+00:00\",\"description\":\"The InfoExpress NAC solution automatically discovers devices before granting network access. It is popular with large educational clients.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/infoexpress-cybergatekeeper.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/infoexpress-cybergatekeeper.png\",\"width\":1400,\"height\":683,\"caption\":\"Blue chip client remotely locking smart devices.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"InfoExpress CyberGatekeeper: NAC Product Review\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\",\"name\":\"Chad Kime\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"caption\":\"Chad Kime\"},\"description\":\"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Infoexpress Cybergatekeeper: NAC Product Review | eSP","description":"The InfoExpress NAC solution automatically discovers devices before granting network access. It is popular with large educational clients.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/","og_locale":"en_US","og_type":"article","og_title":"Infoexpress Cybergatekeeper: NAC Product Review | eSP","og_description":"The InfoExpress NAC solution automatically discovers devices before granting network access. It is popular with large educational clients.","og_url":"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/","og_site_name":"eSecurity Planet","article_published_time":"2023-04-20T11:40:00+00:00","article_modified_time":"2023-06-06T15:53:56+00:00","og_image":[{"width":1400,"height":683,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/infoexpress-cybergatekeeper.png","type":"image\/png"}],"author":"Chad Kime","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Chad Kime","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/"},"author":{"name":"Chad Kime","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9"},"headline":"InfoExpress CyberGatekeeper: NAC Product Review","datePublished":"2023-04-20T11:40:00+00:00","dateModified":"2023-06-06T15:53:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/"},"wordCount":867,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/infoexpress-cybergatekeeper.png","keywords":["NAC","Network Access Control"],"articleSection":["Products"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/","url":"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/","name":"Infoexpress Cybergatekeeper: NAC Product Review | eSP","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/infoexpress-cybergatekeeper.png","datePublished":"2023-04-20T11:40:00+00:00","dateModified":"2023-06-06T15:53:56+00:00","description":"The InfoExpress NAC solution automatically discovers devices before granting network access. It is popular with large educational clients.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/infoexpress-cybergatekeeper.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/infoexpress-cybergatekeeper.png","width":1400,"height":683,"caption":"Blue chip client remotely locking smart devices."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/products\/infoexpress-cybergatekeeper\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"InfoExpress CyberGatekeeper: NAC Product Review"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9","name":"Chad Kime","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","caption":"Chad Kime"},"description":"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.","url":"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/4652"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/271"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=4652"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/4652\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/29757"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=4652"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=4652"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=4652"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=4652"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=4652"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=4652"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}