Smart Fingerprinting - SCUDOS

Smart Fingerprinting

Querying the characteristics of different end devices

The Challange

If a device is to be smuggled into your network as part of an attack, this end device can usually be identified by its MAC address. However, since an attacker is also able to forge this MAC address, the risk of trusting the device in the network is high. Once the attacker has logged on to the network or is not immediately noticed due to the fake MAC address, the risk of causing considerable damage is high.

The Solution

SCUDOS is able to query other characteristics of a terminal device besides the MAC address. So it can be checked by means of the IP address, the DNS name, the operating system or by open service ports whether the terminal device is really what it claims to be by means of the MAC address. By additionally querying these properties, SCUDOS can identify a foreign device in the best possible way and significantly improves network security.

Advantages

Schedule your scans

With SCUDOS, you can automate network vulnerability scans daily, weekly, or at user-defined intervals, significantly reducing the administrative burden of manual processes.

Detect devices automatically

Instead of providing the scanner with a list of known devices, SCUDOS automatically detects all devices connected to your network to immediately scan them.

Lower audit costs

SCUDOS continuously scans connected devices for known security vulnerabilities to provide both on-site and remote teams with a clear picture of the security situation in the network.

Administration via a central console

SCUDOS provides an intuitive management interface for your entire network inventory, allowing even employees without specialized IT skills to perform network vulnerability scans and review reports.

How is SCUDOS used by our customers?

Our solution helps companies of all sizes meet their critical security requirements. The SCUDOS platform combines network access control with device inventory, risk assessment with security incident orchestration, transforming traditional networks into transparent, highly secure and manageable IT infrastructures.