UPAS ZTA Sole Platform Sole Agent
Meeting Cybersecurity Needs Across Various Industries
Learn more
UPAS ZTA Sole Platform Sole Agent
Meeting Cybersecurity Needs Across Various Industries
Learn more
Comprehensive Zero Trust Cyber Security Solutions with 20 Function Modules
Learn more
Comprehensive Zero Trust Cyber Security Solutions with 20 Function Modules
Learn more
NAC Network Access Control
The NAC system of UPAS uses the ARP patented package resolution technology to realize Agent-less data collection, device identification and highly-intensified access control, and realize 100% asset inventory, including IP/MAC management and network access control.
ITAM IT Asset Management
Asset management and security monitoring by automatically scanning endpoint devices, collecting software and system details, and integrating vulnerability databases for automated identification and patching of system vulnerabilities.
IAM Identity Authentication Management
Through binding AD accounts and computers, forbidden local login, forbidden unauthorized domain exit, etc., UPAS forces all computers to follow companies’ security policies and use specific AD accounts for logging in specific PC, integrates AD information and device information, and provides account use records.
IPAM IP Address Management
IPAM can automatically identify device attributes, show IP/MAC information, has the function of multiple binding of IP/MAC/DHCP section/computer name/hardware fingerprint (UUID) for all accessed devices to realize IP protection, IP retention, IP reclamation, and prevent IP conflict and MAC simulation, etc.
Mobile Device Management
By combining the network access control technology, MDM sets application regulation policies by group after compliance inspection and identity authentication when mobile devices are connecting to an organization network to strictly protect organizational information security.
UPAS provides 5 major network security solutions: Network Access Control, IT Information Asset Management, Identity Authentication Management, IP Address Management and Mobile Device Management. These five solutions are integrating by 20 strong modules of UPAS ZTA.
Founded in 1993, UPAS is a pioneer and leader in intranet security control systems. It started from the development of IP management and NAC network access control system products, and has been deeply involved in the fields of information security and network management for many years. Assist customers to establish a comprehensive intranet security control system to solve the problems of corporate intranet security and management efficiency.
Network Access Control

UPAS NOC is able to automate deep identification and classification of devices. You can gain visibility and availability into IP-connected devices including workstation, laptop, printer, camera, access point, IoT device, OT device, medical device and more. Enforce access policies and prevent unauthorized devices from connecting.

Synchronize IP management

Simultaneously IP manage, set the existing DHCP distribution domain settings, realize unified management and allowlist establishment.

Guest Intranet Connection Certification

UPAS provide guest on-site and appointment application for accessing your network. We imposes dynamic control across heterogeneous networks with a real-time asset inventory and the setting of expiry.

Discover Unparalleled Details on Device

It can continuously monitor the installation/version/update of the antivirus software, virus signature, and legal software. Non-compliant devices will be blocked and remediate upon connection. Enhancing the device compliance ratio up to 98% prevents threats from existing infrastructure.

Operate and Maintain with Ease

No restriction of network equipment brand or model number. An approach without requiring proxy program or 802.1X won’t disrupt your business and service, also providing you a less-maintenance solution.

Streamline Management with Information Chart Analysis

Real-time information including devices’ configuration, compliance state and all non-compliant behavior events of IP-connected devices can be aggregated and analyzed via a visual information chart dashboard.



Brands we’re going
forward with