Aruba 802.11ac wireless access points deliver superb Wi-Fi performance – they can be deployed as controller-managed or controllerless Aruba Instant APs depending on the design, scope and scale of your wireless network. And our Wave 2 APs come with multi-user MIMO aware ClientMatch to boost network efficiency.
With AirWave, you can centrally manage controller-based and controllerless wireless networks and generations of wired networks from just about any vendor, across multiple locations.
Aruba Central offers a simple, secure and cost-effective way to manage and monitor Aruba Instant APs and switches. It also has advanced capabilities like customizable guest Wi-Fi, Aruba Clarity and presence analytics for smarter decision making.
ClearPass Policy Manager provides secure network access in a mobile world. It features ultra-scalable AAA with RADIUS and TACACS+ and a policy engine that leverages contextual data based on user roles, device types, app usage and location.
Aruba switches bring performance and reliability to the mobile-first campus. These industry-leading switches are scalable, secure, and feature HPE Smart Rate multi-gigabit ports for high-speed connectivity.
ArubaOS is the operating system for all controller-managed wireless LANs. With an extensive set of integrated technologies and capabilities, ArubaOS is able to deliver a wide range of critical campus mobility services, and is designed to easily share rich contextual information with third party business and IT applications in real-time.
Aruba’s location-based services bridge the gap between digital and physical worlds, engaging employees and customers in new ways, and creating business opportunities and efficiencies. Our solutions include wayfinding capabilities, proximity campaigns, asset tracking, and location analytics.
IntroSpect User and Entity Behavior Analytics (UEBA) uses AI-based machine learning to spot changes in user behavior that often indicate inside attacks that have evaded perimeter defenses. Security teams are armed with insights into malicious, compromised or negligent users, systems and devices – cutting off the threat before it does damage.