Lan Access Control

The security system that manages and controls device access to the corporate network. It verifies and authorizes access to known devices, manages occasional users such as guests/collaborators, and is able to report presence or instantly block any communication the moment an unknown device is connected to the network.
We improve security, appropriately control access to the corporate computer network, and simplify operations according to your needs and the level of security you desire.

Overview

We present the LAC service in two possible modes: active and passive.

Passive mode, allows detection and census of all devices, network topology and location of hosts.
In contrast, in active mode, unauthorized devices are virtually and instantaneously isolated from the network upon access.
Network access permissions are managed through an easy-to-use console that tracks each event and reports anomalies with an alert system.

LAC is available as a physical or virtual appliance, requires no client installations or network modifications, and enables multisite management by implementing a hierarchical architecture.

Frequent use cases

Certain types of businesses are particularly more susceptible to attack vectors from the internal network, especially when they are large organizations or have a widespread presence. Lowering the risks of a business’ most peculiar attack vectors often means getting out of the most efficient cost cases for attackers.

Having a LAC security system makes it easy to control device access, even when access occurs at locations without IT garrison.

Completely blocking communication to unknown devices involves network access control (NAC) solutions that are very complex to govern without specific expertise.

The benefits of Vulnerability Management
1
Awareness
We highlight critical infrastructure vulnerabilities that could be exploited by cyber criminals.
2
Optimization
We highlight each vulnerability and focus on the most critical ones.
3
Operational continuity
We fix vulnerabilities that could compromise business operations and cause financial or reputational damage.
CONTACTS

We are ready to listen to you. Write to us, we are at your disposal.