Modules for ARP-GUARD
Our ARP-GUARD extensions
The solution for your application
Captive Portal – secure and convenient guest access
ARP-GUARD Captive Portal controls network access for guest or third-party components such as smartphones and notebooks. Targeted and restricted network access can be determined for third-party devices in any environment, whether LAN or WLAN. Access can be controlled at any time by the use of a dynamic firewall ruleset. The sensor management architecture enables a guest portal to be deployed across multiple locations.
BYOD (Bring Your Own Device) is easy and convenient to implement – private end devices are only granted access to resources that have been explicitly approved for this purpose by the rules. Authentication is carried out via MAC / user password, LDAP access e.g. to Active Directory.
The advantages to you at a glance:
- Secure and convenient guest access
- BYOD for employees, visitors and maintenance technicians
- Guest portal with self-registration
- Integrated dynamic firewall
Endpoint - network integrity up to the end device
ARP-GUARD Endpoint provides valuable support for implementation of compliance requirements. During authentication, the system checks whether end devices comply with security policies and are “compliant” with regard to security-related details such as the status and pattern of the antivirus program or the patch level of the operating system. Checks are carried out via WMI, SNMP traps and syslog, interfaces with AV servers, IPS systems. A client installation is not required for this. Devices that do not comply with the policies are isolated and can obtain the required updates in a quarantine VLAN, for example. Only then do the systems regain access to the respective network areas.
The advantages to you at a glance:
- Agentless testing system
- Enforcement of security policies and compliance guidelines
- Checking of security-related properties such as antivirus patterns and patch level
- Guarantee of network integrity all the way to the end device
- Automated measures in case of rule violations (quarantine VLAN)
Cluster - high availability for sensitive IT areas
ARP-GUARD Cluster provides “ready-to-work” server replication with low software and hardware costs. ARP-GUARD Network Access Control thus offers greater resilience and scalability for critical IT systems. Particularly in healthcare or time-sensitive production processes, availability and system security are of equal priority. With a geo-redundant cluster solution, maximum system availability is guaranteed in the worst-case scenario.
The advantages to you at a glance:
- High availability for sensitive IT areas
- Maximum reliability for critical infrastructures
- Out-of-the-box server replication
- Mix of virtual instance and appliance is possible
Enterprise Management – homogeneous IT security across the group
ARP-GUARD Enterprise Management is a fully multi-client capable extension of our ARP-GUARD Network Access Control solution based on sensor management architecture, and opens up significant savings potential in the corporate environment by enabling centralized orchestration and protection of distributed and heterogeneous network environments with over 100,000 end devices. For the purposes of deeper analysis, a central data interface is also available for connection to common SIEM systems and security operations centers.
The advantages to you at a glance:
- Orchestrate global corporate structures centrally
- Multi-client capable system with maximum availability
- Central set of rules can be operated with site-specific rules
- Unlimited MAC address/device capture
Layer 2 IPS - Protection against network manipulation
ARP-GUARD Layer 2 IPS (Intrusion Prevention System) acts as an early warning system to identify vulnerabilities in the network and to detect and ward off attacks in real time. The sensors continuously analyze data traffic for signs of unusual or suspicious behavior that could indicate an attack.
The advantages to you at a glance:
- Detection of ARP spoofing (also ARP poisoning / man-in-the-middle attacks)
- Detection of IP and MAC address conflicts / IP spoofing
- Prevention of CAM table overflow and detection of MAC flooding
- Prevention of DoS and DDoS attacks