UPAS ZERO-TRUST PLATFORM
UPAS provides 5 major network security solutions: Network Access Control, IT Information Asset Management, Identity Authentication Management, IP Address Management and Mobile Device Management. These five solutions are integrating by 20 strong modules of UPAS ZTA.

UPAS ZTA
NETWORK OPERATIONS CENTER
UPAS delivers five core network security solutions—Network Access Control, IT Asset Management, Identity Authentication, IP Address Management, and Mobile Device Management—seamlessly integrated through 20 powerful modules built on the UPAS Zero Trust Architecture (ZTA) platform.
Key Features
UPAS delivers five integrated network security solutions—NAC, IT asset management, identity authentication, IP address management, and mobile device management—powered by 20 robust modules within its Zero Trust Architecture (ZTA) framework for complete, centralized protection.

Network Access Control
UPAS NOC automates the identification and classification of all IP-connected devices—including workstations, laptops, printers, IoT/OT, and medical devices—providing full visibility. It enforces access policies to prevent unauthorized devices from connecting, ensuring secure and controlled network access.

Discover Unparalleled Details on Device
UPAS continuously monitors antivirus status, virus signatures, and approved software versions on connected devices. Non-compliant endpoints are automatically blocked and remediated upon detection, raising compliance rates to 98% and significantly reducing risks across your existing infrastructure.

Synchronize IP management
Manage IP addresses across your network while configuring and integrating existing DHCP settings for centralized, unified control. UPAS enables allowlist creation and enforcement, ensuring only authorized devices connect—enhancing security and simplifying network administration.

Operate and Maintain with Ease
UPAS is compatible with all network equipment brands and models, requiring no proxy software or 802.1X configuration. This ensures a seamless, non-disruptive deployment with minimal maintenance, making it ideal for diverse and complex network environments.

Guest Intranet Connection Certification
UPAS provides guest and scheduled network access with dynamic policy control, real-time asset tracking, and customizable access expiry, ensuring secure and efficient connectivity across diverse network environments.

Streamline Management with Information Chart Analysis
Real-time data on device configurations, compliance status, and non-compliant behaviors are continuously collected, analyzed, and displayed through an intuitive visual dashboard, providing clear insights for faster decision-making and more effective network management.
NAC – Network Access Control
UPAS NAC leverages patented ARP packet resolution technology to enable agent-less data collection, accurate device identification, and robust access control. It ensures 100% asset inventory, including IP/MAC address management and comprehensive network access enforcement.


ITAM – IT Asset Management
UPAS ITAM automatically scans endpoint devices to collect software, hardware, and system details. It integrates with vulnerability databases to identify risks and supports automated patching, enabling effective asset tracking and security monitoring.
IAM – Identity & Access Management
UPAS enforces security policies by binding AD accounts to specific devices, restricting local logins and unauthorized domain exits. It ensures users log in with assigned AD accounts, integrates AD and device data, and maintains detailed account usage records.


IPAM – IP Address Management
UPAS IPAM automatically identifies device attributes and displays IP/MAC information. It supports multiple bindings of IP, MAC, DHCP range, computer name, and hardware fingerprint (UUID) to ensure IP protection, retention, reclamation, and prevent IP conflicts and MAC spoofing.
Mobile Device Management (MDM)
Leveraging network access control technology, UPAS MDM enforces application policies by group after compliance checks and identity authentication, ensuring strict protection of organizational data when mobile devices connect to the network.
