Network Access Control - SCUDOS

Network Access Control

Prevent Unauthorized Access to Your Network

The Challenge

Your network infrastructure is responsible for the most important IT applications in your organization. This makes it a highly vulnerable area and interesting for attackers. IT investments in security are still heavily focused on perimeter protection, leaving your internal network largely unprotected as today's threats easily overcome Layer 3 security solutions. Most organizations lack the tools to effectively enforce policies and protect devices on the internal network. Network ports can be easily misused by users, knowingly or unknowingly, and unmanaged devices are used by attackers to infiltrate your network. Unwarying users can provide direct access to the network by plugging in or connecting foreign devices via WiFi. This unprotected connection can in turn be used by attackers to gain unauthorized access to the network infrastructure.

The Solution

SCUDOS provides a holistic approach to the security of your network infrastructure by allowing you to monitor and control which devices connect to your network and respond immediately to potential threats. The solution maps all active devices on the network and compares this information with the Trusted Base. Any suspicious connection attempt triggers a response according to the policies defined in SCUDOS. This can be an alert or an e-mail notification. The device can then be quarantined or even completely blocked from accessing the network.


Fast and Non-Intrusive Setup
Agentless fingerprinting to be matched against a managed repository of trusted devices. Delivers immediate results.
Detects Layer-2 Threats
SCUDOS includes a Layer-2 IPS module which monitors the network to prevent threats such as spoofing and flooding attack vectors.
Defining a Granular Policy
SCUDOS allows you to configure a set of automated actions in case of a security issue, from email notifications to blocking the port and quarantine the device.
Get Real-Time Alerts
Checks the network for irregularities and undesired connections to rapidly detect and solve networking issues.

How Do Our Customers Use SCUDOS?

Our solutions help organizations of any size to solve their critical security needs. The SCUDOS platform combines network access control with device inventory, risk assessment and incident response orchestration, transforming traditional IT infrastructures into transparent, highly secured, insight-driven networks.