ScopNET is a solution that is compatible with all independent brand and model network devices with the aim of preventing unauthorized devices from accessing the corporate network. The auditor can perform his/her duties, managing 802.1x operations with the use of ScopNET Radius Architecture instead of using 802.1x protocol.
After users are authorized to join the network, it is important to identify any behaviour-based security breaches that may occur, without the use of an agent. In this way, any security breaches that take place after a user accesses the network can be detected with minimum operational costs.
Custom Integration and
Management for Distributed Architectures
ScopNET enables direct command execution on network devices. This structure increases efficiency in large systems.
Easy integration with all devices that support SSH / Telnet / SNMP protocol.
ScopNET Radius Key Features
Active Directory Dynamic VLAN assignment
Prioritize Dynamic VLAN Assignments
Dynamic VLAN assignment by NAS Port Type. (Ability to assign different VLANs to users connecting over wireless and users connecting through a cable)
Wildcard MAC Bypass and Dynamic VLAN assignment
Time dependent MAC Bypass operations (integrated with NAC, Discard Device and Discard with Date)
User - Computer and Certificate-based authentication
To be able to identify MYSQL-based users and assign roles
Assign different VLANs for mobile devices
CONTROL OF YOUR NETWORK IS IN YOUR HANDS
ScopNET provides an agent-free solution for the prevention of unauthorized access to corporate networks, integrating switches, routers and firewalls to detect alien devices and incorporating all the features of next-generation NAC solutions.
ScopNET offers different methods to prevent network access to a computer. Similar to the way the system can being integrated with routers, switches and firewalls to control detection and access of devices, using ARP-Poisoning or TCP-Reset techniques, the network infrastructure can be operated on unmanaged network devices without any connection. This does not require any software installation on end-user machines. Sniffer or Port Mirroring is also not required. Due to the minimum impact on corporate networks, this is a very easy solution to implement.
Different methods can be used to prevent a computer from accessing the network:
Switch Port VLAN Replacement
Wireless Controller Management
Use any information with WMI or remote Registry access for security verification
Centralized management and distribution
No software installation or device requirements for remote locations
Distributed architectural support
Captive-Portal for guest management
Integrated SIEM infrastructure
Detailed network scanning for device classification
After NAC integration, the users who are not domain users within the corporate network can be detected easily. Important Wsus (Windows Server Update Services) operations such as antivirus updates will become mandatory.