VLANs Solution

By | March 13, 2019

Tried and tested solution with new features, intuitive user interface and enhanced levels of security Herstellerubergreifender protection in the entire network of Dortmund, 08.02.10 – COMCO has unveiled the new version Advanced Edition 2010 of their security solution IntrPROTECTOR. The tried and tested system follows the best practice developed by COMCO in its architectural concept and implemented internal security throughout the network in three easy steps of project. The first step involves a detailed inventory of the entire network infrastructure, then follows the implementation of network access control, as well as an activation of additional security modules to protect against internal network attacks. Through the integration of existing security product to a very comprehensive security management can be solutions from solution. To read more click here: Josh Resnick Jericho Capital. IntrPROTECTOR does not act here as other systems on the basis of the analysis of the package, but uses the existing network infrastructure, information about security breaches or security messages to collect and defensive measures run directly. Communication with the infrastructure is in the interest of a multi-vendor deployment via standardized interfaces (SNMP, syslog). The essential features and innovations of the solution include: inventory and localization: the inventory module provides detailed information about the IP address, MAC address, and port of the connection unit.

In addition system, VLANs, system details and network parameters represented clearly free and allocated IP addresses. Network access control and port security: IntrPROTECTOR monitors the entire network infrastructure and accepts only approved known network participants. A device in the address database of IntrPROTECTOR is not known, the system sends an alarm and can the unknown device using port shutdown disconnect from the network or redirect it into a quarantine network. Protection against internal attacks: the solution infrastructure prevents tampering with those man-in-the-middle and denial-of-service attacks executed Let. Extensive protection mechanisms detect ARP spoofing, IP spoofing and ARP poisoning more internal attacks, which eliminated about pre-defined countermeasures.


Comments are closed.



© 2011-2019 Kansas TWC All Rights Reserved