ScopNET is a solution that is compatible with all independent brand and model network devices with the aim of preventing unauthorized devices from accessing the corporate network. The auditor can perform his/her duties, managing 802.1x operations with the use of ScopNET Radius Architecture instead of using 802.1x protocol.
World-Class Solutions
and Services
After users are authorized to join the network, it is important to identify any behaviour-based security breaches that may occur, without the use of an agent. In this way, any security breaches that take place after a user accesses the network can be detected with minimum operational costs.
Custom Integration and
Management for Distributed Architectures
ScopNET enables direct command execution on network devices. This structure increases efficiency in large systems.
Easy
Setup
Easy integration with all devices that support SSH / Telnet / SNMP protocol.
802.1x Support
ScopNET Radius Key Features
Active Directory Dynamic VLAN assignment
Prioritize Dynamic VLAN Assignments
Dynamic VLAN assignment by NAS Port Type. (Ability to assign different VLANs to users connecting over wireless and users connecting through a cable)
MAC Bypass
Wildcard MAC Bypass and Dynamic VLAN assignment
Time dependent MAC Bypass operations (integrated with NAC, Discard Device and Discard with Date)
User - Computer and Certificate-based authentication
To be able to identify MYSQL-based users and assign roles
Assign different VLANs for mobile devices
CONTROL OF YOUR NETWORK IS IN YOUR HANDS
ScopNET provides an agent-free solution for the prevention of unauthorized access to corporate networks, integrating switches, routers and firewalls to detect alien devices and incorporating all the features of next-generation NAC solutions.
STRUCTURAL FEATURES
ScopNET offers different methods to prevent network access to a computer. Similar to the way the system can being integrated with routers, switches and firewalls to control detection and access of devices, using ARP-Poisoning or TCP-Reset techniques, the network infrastructure can be operated on unmanaged network devices without any connection. This does not require any software installation on end-user machines. Sniffer or Port Mirroring is also not required. Due to the minimum impact on corporate networks, this is a very easy solution to implement.
GENERAL FEATURES
Agentless architecture
Different methods can be used to prevent a computer from accessing the network:
ARP Poisoning
Switch Port VLAN Replacement
ACL Management
Wireless Controller Management
Use any information with WMI or remote Registry access for security verification
Centralized management and distribution
No software installation or device requirements for remote locations
Distributed architectural support
Web-based interface
Detailed reporting
Captive-Portal for guest management
Integrated SIEM infrastructure
Detailed network scanning for device classification
After NAC integration, the users who are not domain users within the corporate network can be detected easily. Important Wsus (Windows Server Update Services) operations such as antivirus updates will become mandatory.