The SCUDOS Platform

Introducing the first adaptive Infrastructure Security Management solution

A Holistic Approach to Network Infrastructure Security

Know, visualize and control which devices are connected to your network and identify potential risks, with minimal operational effort.
By incorporating agentless mapping and fingerprinting techniques with access control policies and network segmentation mechanisms, the solution allows organizations to increase security and simplify operations within their core network. Unauthorized devices are prevented from accessing sensitive network segments and potential malicious intruders are blocked. In case of an incident, the SCUDOS orchestration module can automatically contain compromised hosts before a human becomes involved in the process.

How It Works


Create a complete view of your network and connected devices

  • Agentless Fingerprinting
    SCUDOS uses fingerprinting techniques to remotely identify all connected devices. This includes information such as device vendor, OS, open ports and services, associated VLANs, IP addresses, hostnames, MAC addresses and manufacturer.
  • Topology Mapping

    A highly efficient algorithm to map your network topology structure. The process allows an interactive and intuitive graphical representation of the network topology in real time as well as historically.

  • Vulnerability Scanning

    To help you detect and remediate the vulnerabilities in your environment, the SCUDOS platform includes a built-in network vulnerability scanner to continuously monitor all connected devices for open ports, missing patches, improper configurations and other violations.


Prevent unauthorized access to your network infrastructure

  • Access Control

    SCUDOS creates and manages a repository of trusted devices, either by automatically pulling information from 3rd party inventory systems or by having it added by the administrator. Any connection made by an unknown device will trigger an alert and can be then quarantined or blocked, depending on the defined policy.

  • VLAN Enforcement

    Rather than blocking a device only by its IP address, SCUDOS interacts directly with network switches to ensure strong network segmentation that cannot be bypassed by advanced malware. The solution includes built-in connectors with leading infrastructure vendors, thus supporting mixed environments.

  • Layer-2 IPS

    Backed by a granular policy framework, SCUDOS protects the network from Layer-2 attacks such as spoofing and flooding techniques. This is done by correlating data such as ARP caches, CAM tables, SMB/CIFS sessions, port scanning, inventory systems and more.


Respond in milliseconds to security incidents and networking issues


    SCUDOS’ APIs allow you to immediately contain a threat in your network before a human becomes involved in the process. The solution integrates with any of your existing security tools, so once a compromise is detected, SCUDOS will automatically take pre-defined remediation actions.

  • IT Management

    Centralized management console to facilitate administration tasks for the core network. SCUDOS translates vendor-specific attributes into a homogenous and graphical management control which does not require any networking expertise. Critical IT management tasks such as the setup of switches, device rollout and updating security policies are easily performed.

Ready to Get Started with SCUDOS?