Skip to main content
Conditional Access Hero

Smart Network Access Decisions, Zero Manual Work

Define who gets on your network, what they can access, and when — all from a visual policy builder. No scripting required.

Policy-Driven Access Control

Six capabilities that automate network access decisions

Visual Policy Builder

Drag-and-drop IF/THEN rules for network access decisions. Build complex policies without writing a single line of code or learning a scripting language.

  • IF/THEN rule builder
  • Drag-and-drop interface
  • Nested condition groups
  • Real-time syntax validation

Device Posture Checks

Verify encryption status, OS version, and antivirus presence before granting access. Non-compliant devices get quarantined or redirected automatically.

  • Disk encryption verification
  • OS version requirements
  • Antivirus & firewall checks
  • Jailbreak/root detection

Dynamic VLAN Assignment

Route users to the right network segment automatically based on their role, device type, or compliance status. No manual switch configuration needed.

  • Role-based segmentation
  • Device-type routing
  • Guest vs. employee isolation
  • Automatic fallback VLANs

Compliance Templates

Pre-built policy sets for HIPAA, PCI-DSS, FERPA, and SOC 2 that you can deploy with one click and customize to match your exact requirements.

  • HIPAA network isolation
  • PCI-DSS segmentation
  • FERPA student data protection
  • SOC 2 access logging

Policy Simulation

Test what would happen if a specific user connected right now. Simulate authentication requests against your policies before deploying changes to production.

  • What-if scenario testing
  • Pre-deploy validation
  • User-specific simulation
  • Policy conflict detection

Audit Trail

Full version history for every policy change with side-by-side diffs. See who changed what and when, and roll back to any previous version with one click.

  • Version history for all policies
  • Side-by-side diff view
  • One-click rollback
  • Change attribution & timestamps

How Policies Work

Define conditions on the left, assign actions on the right

Define Conditions

  • User Groups — Active Directory, LDAP, or local groups
  • Device Type — Corporate laptop, personal phone, IoT sensor
  • Time of Day — Business hours, weekends, maintenance windows
  • Location — Building, floor, access point, or SSID
  • Compliance Status — Encryption on, OS patched, AV running

Automatic Actions

  • VLAN Assignment — Route to the correct network segment
  • Bandwidth Limits — Throttle by role, device, or time
  • MFA Triggers — Require step-up authentication
  • Deny with Reason — Block access and show why
  • SIEM Logging — Forward events to Splunk, Sentinel, or syslog

Works With Your Existing Setup

Policies evaluate on every RADIUS authentication. No agent installation, no network changes. If your access points already talk to a RADIUS server, conditional access works out of the box.

Frequently Asked Questions

What is a conditional access policy engine?

It's a rules engine that makes real-time decisions about network access based on who's connecting, what device they're using, and whether they meet your security requirements.

Do you have pre-built compliance templates?

Yes. We ship templates for HIPAA, PCI-DSS, FERPA, and SOC 2 that you can deploy with one click and customize to your needs.

Will this affect my existing WiFi setup?

No. Policies evaluate during RADIUS authentication, so they work with your current infrastructure. No agents to install, no network reconfiguration needed.

How steep is the learning curve?

The visual builder is designed for IT admins, not developers. Most customers have their first policy running within 30 minutes.

Ready to Automate Network Access Decisions?

Start a 14-day free trial. Build your first conditional access policy in under 30 minutes.

Start 14-Day Free Trial See Pricing