REPORT BREACH
DEMO REQUEST
ASK QUESTION
  +90 212 283 0046
TR
TR
  +90 212 283 0046

SCOP NET

Your Corporate Network is in Safe Hands
ScopNET is a solution that is compatible with all independent brand and model network devices with the aim of preventing unauthorized devices from accessing the corporate network. The auditor can perform his/her duties, managing 802.1x operations with the use of ScopNET Radius Architecture instead of using 802.1x protocol.
World-Class Solutions
and Services
After users are authorized to join the network, it is important to identify any behaviour-based security breaches that may occur, without the use of an agent. In this way, any security breaches that take place after a user accesses the network can be detected with minimum operational costs.
Custom Integration and
Management for Distributed Architectures
ScopNET enables direct command execution on network devices. This structure increases efficiency in large systems.
Easy
Setup
Easy integration with all devices that support SSH / Telnet / SNMP protocol.
802.1x Support
ScopNET Radius Key Features
Active Directory Dynamic VLAN assignment
Prioritize Dynamic VLAN Assignments
Dynamic VLAN assignment by NAS Port Type. (Ability to assign different VLANs to users connecting over wireless and users connecting through a cable)
MAC Bypass
Wildcard MAC Bypass and Dynamic VLAN assignment
Time dependent MAC Bypass operations (integrated with NAC, Discard Device and Discard with Date)
User - Computer and Certificate-based authentication
To be able to identify MYSQL-based users and assign roles
Assign different VLANs for mobile devices
CONTROL OF YOUR NETWORK IS IN YOUR HANDS
ScopNET provides an agent-free solution for the prevention of unauthorized access to corporate networks, integrating switches, routers and firewalls to detect alien devices and incorporating all the features of next-generation NAC solutions.
STRUCTURAL FEATURES
ScopNET offers different methods to prevent network access to a computer. Similar to the way the system can being integrated with routers, switches and firewalls to control detection and access of devices, using ARP-Poisoning or TCP-Reset techniques, the network infrastructure can be operated on unmanaged network devices without any connection. This does not require any software installation on end-user machines. Sniffer or Port Mirroring is also not required. Due to the minimum impact on corporate networks, this is a very easy solution to implement.


GENERAL FEATURES

  • Agentless architecture
  • Different methods can be used to prevent a computer from accessing the network:
  • ARP Poisoning
  • Switch Port VLAN Replacement
  • ACL Management
  • Wireless Controller Management
  • Use any information with WMI or remote Registry access for security verification
  • Centralized management and distribution
  • No software installation or device requirements for remote locations
  • Distributed architectural support
  • Web-based interface
  • Detailed reporting
  • Captive-Portal for guest management
  • Integrated SIEM infrastructure
  • Detailed network scanning for device classification

MODULE ARCHITECTURE

Inventory Collection Module:

  • Antivirus Information and Analysis
  • Critical Security Events Tracking (Delete Security Log, Change Group Membership, etc.)
  • Virtualization Platforms NAT Detection
  • Program and Service Monitoring
  • Monitoring of installed programs
  • Operating System Version Monitoring
  • Real IP Address & Unauthorized DHCP & Static IP Detection
  • Patch Analysis
  • Flexible Inventory Reporting with WMI & Remote Registry

Advanced Security Module:

  • Port Scan Detection
  • Successful/Failed Login Detection

Threat Analysis Module:

  • Network Port Applications
  • Network Traffic Applications
  • Bandwidth Usage Analysis
  • Network Traffic Analytics
  • Port Scan Detection
  • Unauthorized User Name/Password Usage
  • Detection of Weak SNMP Passwords
  • Detection of Weak Windows Passwords
  • Detection of Newly Created Windows Services
  • Tracking of Windows AutoRun, Service List and Scheduled Tasks
  • MAC Spoofing Detection
DOWNLOAD DATASHEET
WHAT CAN BE GAINED WITH SCOPNET
After NAC integration, the users who are not domain users within the corporate network can be detected easily. Important Wsus (Windows Server Update Services) operations such as antivirus updates will become mandatory.
  • Block alien network devices
  • Create a secure visitor pool with guest VLAN
  • Implementation of NAC policies
DOWNLOAD DATASHEET
+90 212 283 0046
Maslak Mah. AOS 55. Sk. 42 Maslak Sitesi No:4
Kolektif House B Ofis Kat:8
Sarıyer / İstanbul
INFORMATION
ISTANBUL OFFICE
Maslak Mah. AOS 55. Sk. 42 Maslak Sitesi No:4
Kolektif House B Ofis Kat:8
Sarıyer / İstanbul
+90 212 283 0046
+90 212 283 0047
ANKARA OFFICE
ODTÜ Teknokent Mustafa Kemal Street.
Dumlupınar Bulvarı 280/G Kat: 2
06510 Çankaya / Ankara, Turkey
+90 312 227 05 09
+90 312 227 05 75
© 2018 MaySiber. All rights reserved.