News
Create the Future, Beyond the Limit
ViaScope ‘IPScan NAC’, BYOD/IoT secure connection support
Created date2022.03.29

Contents


Enhanced internal security by controlling wired and wireless network users and devices
Installation without changing the existing network… Enhanced managemnt conveneince

As our society evolves into a society in which connectivity has become more important, such as cloud, IoT, BYOD, and edge computing, the number of endpoints connected to the network is increasing indefinitely. Endpoints exposed to unprovoked attacks can transmit infections into the network, which therefore poses a serious security threat.

ViaScope’s ‘IP Scan NAC’ helps strengthen the internal information security system by controlling users and devices accessing wired and wireless networks, preventing data retention by unauthorized users and unauthorized devices, and enabling applications to be operated quickly and safely. It also prevents threats from spreading to the internal network by detecting device vulnerabilities, malware infection, and security status.

In particular, IPScan NAC can be installed in a simple manner without affecting the existing network environment, and provide enhanced management convenience by providing various analytic functions and reports required by the administrator. It also provides enhanced IP address management (IPAM) functions such as switch port monitoring and control and authentication NIC setting, and enables it to control IoT devices in an IPv6 network environment such as IPv6 security mode setting and non-connection period elapse setting.

Since both the agent method and agentless method can be mixed and configured, flexible NAC policy operation becomes possible, network security risk factors can be removed in advance, and threats to security threats can be minimized. It has achieved security, management effectiveness, and operational convenience.

 

Guaranteed internal and external network visibility

IPScan NAC collects network resource information from all devices connected to the network and identifies the platform of the detected terminal. It classifies the device OS usage status and device type, and enables in-depth analysis according to statistics and history management, and PC diagnosis results for each department and user. It also supports audit log, management log, command log, event log reporting, license usage status check, and management switch status check.

IPScan NAC provides status of each IP version, such as IPv4 and IPv6 on the dashboard, and implements ‘Detect’ and ‘Block’ function in the network. It also holds a number of key patents related to device detection, monitoring, and blocking in IPv6 network.

 

Agent and Agentless mixed configuration

Providing an agent and agentless-based user authentication service and management method, it can request an unauthorized host through a web page. With the permission of the administrator, it is possible to access the network for a certain period of time without installing an agent. In addition, the agentless operation is recognized as a normal user when the user logs in from the web through the ID and password registered in advance, and it is provided without separate approval from the administrator.

 

External user network access control operation

IPScan NAC can be set to manage and control access by separating internal and external user bands. It saves the network resource information such as IP and MAC of the authorized host in a DB, and through this, it restricts the network access of unauthorized hosts that are not registered by the administrator so that the network administrator can efficiently distribute network resources.

It controls the access time and route of external visitors, completely blocks the access route to the internal network. When an unauthorized host accesses internal or external network, the sensor equipment of the corresponding band detects it in real time, and transmits the detected information as a real-time event. These events can be monitored by the network administrator through the console program. In addition, network security vulnerabilities can be minimized by verifying the integrity of external user terminals.

User network access history tracking

Since all events and the history of policies that occur in the network are saved, the data can be checked when an issue occurs or when the administrator wants. With an OLAP analysis tool, the administrator can easily and quickly analyze and search from various viewpoints.

With the use of the powerful event log analysis function, even if the user of a specific IP at the time of occurrence of an issue is different from the user at the present time, the user at that time can be specified and the policies applied to the user at the time can be checked, which will enable it to minimize internal security threats by isolating terminals that generate excessive traffic in real time.

De-identification of personal information

In response to the 3 data laws amended in 2020, IPScan NAC supports the de-identification of personal information so that it can be used safely and efficiently through pseudonymization of collected personal information (IP, MAC, etc.). It provides a de-identification technique for data analysis to those in charge of using the data of internal asset information, prevents the leakage of pseudonymized asset (personal) information, thus improving the utilization value of existing data.

IPScan NAC also provides a redirection function, so that when the user’s PC is blocked, it is possible to ‘notify the reason for blocking’ or ‘induce the installation of an agent’. In a network environment with enhanced security, most web traffic is moving from HTTP to HTTPS. Although HTTP redirection is simple process, there is no such product that supports HTTPS because all data is encrypted and the contents cannot be checked. However, IPScan NAC supports both HTTP and HTTPS redirection and holds related patents.

Unauthorized router/host detection

To customers with both large and small networks and IT assets, unauthorized routers and their sub-tier hosts are considred a big problem in terms of security management and indicators, as well as a blind spot for management. Agentless-based technology is essential to detect the router and the terminal at the sub-tier of the router.

In consideration of these aspects, ViaScope has developed a system that can detect the existence of NAT, private IP, and environmental information of the terminal, and applied for a patent. In the future, through a source patent that can only be used by ViaScope, VisScope will leverage it for new product development and combine it with NAC products. Through this, ViaScope plans to provide customers with a security check system against the router usage environment and use it to develop new markets.

Source: Datanet (http://www.datanet.co.kr)