Modules for ARP-GUARD

Our ARP-GUARD extensions

The solution for your application

Captive Portal – secure and convenient guest access

ARP-GUARD Captive Portal controls network access for guest or third-party components such as smartphones and notebooks. Targeted and restricted network access can be determined for third-party devices in any environment, whether LAN or WLAN. Access can be controlled at any time by the use of a dynamic firewall ruleset. The sensor management architecture enables a guest portal to be deployed across multiple locations.

BYOD (Bring Your Own Device) is easy and convenient to implement – private end devices are only granted access to resources that have been explicitly approved for this purpose by the rules. Authentication is carried out via MAC / user password, LDAP access e.g. to Active Directory.

 

The advantages to you at a glance:

  • Secure and convenient guest access
  • BYOD for employees, visitors and maintenance technicians
  • Guest portal with self-registration
  • Integrated dynamic firewall

Further information about

Captive Portal

Endpoint - network integrity up to the end device

ARP-GUARD Endpoint provides valuable support for implementation of compliance requirements. During authentication, the system checks whether end devices comply with security policies and are “compliant” with regard to security-related details such as the status and pattern of the antivirus program or the patch level of the operating system. Checks are carried out via WMI, SNMP traps and syslog, interfaces with AV servers, IPS systems. A client installation is not required for this. Devices that do not comply with the policies are isolated and can obtain the required updates in a quarantine VLAN, for example. Only then do the systems regain access to the respective network areas.

 

The advantages to you at a glance:

  • Agentless testing system
  • Enforcement of security policies and compliance guidelines
  • Checking of security-related properties such as antivirus patterns and patch level
  • Guarantee of network integrity all the way to the end device
  • Automated measures in case of rule violations (quarantine VLAN)

Further information about

Endpoint

Cluster - high availability for sensitive IT areas

ARP-GUARD Cluster provides “ready-to-work” server replication with low software and hardware costs. ARP-GUARD Network Access Control thus offers greater resilience and scalability for critical IT systems. Particularly in healthcare or time-sensitive production processes, availability and system security are of equal priority. With a geo-redundant cluster solution, maximum system availability is guaranteed in the worst-case scenario.

 

The advantages to you at a glance:

  • High availability for sensitive IT areas
  • Maximum reliability for critical infrastructures
  • Out-of-the-box server replication
  • Mix of virtual instance and appliance is possible

Further information about

Cluster

Enterprise Management – homogeneous IT security across the group

ARP-GUARD Enterprise Management is a fully multi-client capable extension of our ARP-GUARD Network Access Control solution based on sensor management architecture, and opens up significant savings potential in the corporate environment by enabling centralized orchestration and protection of distributed and heterogeneous network environments with over 100,000 end devices. For the purposes of deeper analysis, a central data interface is also available for connection to common SIEM systems and security operations centers.

 

The advantages to you at a glance:

  • Orchestrate global corporate structures centrally
  • Multi-client capable system with maximum availability
  • Central set of rules can be operated with site-specific rules
  • Unlimited MAC address/device capture

Further information about

Enterprise Management

Layer 2 IPS - Protection against network manipulation

ARP-GUARD Layer 2 IPS (Intrusion Prevention System) acts as an early warning system to identify vulnerabilities in the network and to detect and ward off attacks in real time. The sensors continuously analyze data traffic for signs of unusual or suspicious behavior that could indicate an attack. 

 

The advantages to you at a glance:

  • Detection of ARP spoofing (also ARP poisoning / man-in-the-middle attacks)
  • Detection of IP and MAC address conflicts / IP spoofing
  • Prevention of CAM table overflow and detection of MAC flooding
  • Prevention of DoS and DDoS attacks

Further information about

Intrusion Prevention System
Contact
Service area
Newsletter

Contact

Service area

ARP-GUARD service area

If you are already an ARP-GUARD partner, you can access your personal service area here.

Get the latest releases and up-to-date knowledgebase articles and manage your ARP-GUARD.

Partner login

Become an ARP-GUARD partner now!

Would you like to make the most of the advantages of our solution and complete your “Network Security” portfolio? 

Then you have the opportunity to become an ARP-GUARD partner!

Become a partner

Newsletter

We inform you about current topics, such as events and new product features.

Keep up-to-date at all times!

ARP-GUARD newsletter

Register Now!