Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Switch Protector serves as an additional engine for Switch Center software, delivering Network Access Control (NAC) by leveraging IEEE-802.1X features across managed network switch ports, thereby safeguarding networks against potential intruders, unauthorized connections, and harmful activities from within the organization. This NAC monitoring software functions as a robust security solution, integrating a diverse array of access protection rules aimed at both intrusion detection and prevention. Its real-time protection monitor is designed to identify new network connections or any alterations within the network, including detecting suspicious activities that could pose a threat. The software's built-in protection rules facilitate the enforcement of network security policies, ensuring proactive access control for any network nodes that breach the established security measures. Moreover, users can manage the protection engine through an integrated administration interface or via the organization's intranet web, providing an efficient way to control access permissions for authorized network nodes. As a result, Switch Protector significantly enhances the overall security posture of the network environment.

Description

The ultimate solution that safeguards against every potential threat across all pathways in your network is essential. Relying solely on outdated firewall systems, without integrating advanced security measures like ThreatBlockr®, leaves networks vulnerable to cyber attacks. Traditional firewalls can be easily compromised by encrypted threats, navigated through port forwarding fragmented packet assaults, and often suffer from misconfigurations. Furthermore, they struggle with straightforward extended web and messaging protocols, and issues such as side-channel attacks, BYOD, and remote work only exacerbate these vulnerabilities. Organizations can leverage ThreatBlockr® to achieve immediate network security enhancements without the need for a complete overhaul of their current security frameworks, regardless of whether their operations are on-premise, cloud-based, or a hybrid of both. By implementing ThreatBlockr® now, you can strengthen your security posture and regain peace of mind, knowing that your network is secure no matter your location. This not only establishes an optimally protected network but also boosts the efficiency of your firewalls significantly.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

AT&T Alien Labs Open Threat Exchange
Apple Business Essentials
CINS
Cisco Talos
Cyjax
Fastly
Fortinet Security Fabric
Gravwell
Mailchimp
Microsoft 365
OpenText Threat Intelligence
Proofpoint Emerging Threat (ET) Intelligence
Recorded Future
Siemplify
SolarWinds Pingdom
Splunk Enterprise
SurveyMonkey
ThreatConnect Threat Intelligence Platform
ThreatStream
TruSTAR

Integrations

AT&T Alien Labs Open Threat Exchange
Apple Business Essentials
CINS
Cisco Talos
Cyjax
Fastly
Fortinet Security Fabric
Gravwell
Mailchimp
Microsoft 365
OpenText Threat Intelligence
Proofpoint Emerging Threat (ET) Intelligence
Recorded Future
Siemplify
SolarWinds Pingdom
Splunk Enterprise
SurveyMonkey
ThreatConnect Threat Intelligence Platform
ThreatStream
TruSTAR

Pricing Details

$99 per 10 devices
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Lan-Secure

Website

www.lan-secure.com/SwitchCenterProtector.htm

Vendor Details

Company Name

ThreatBlockr

Country

United States

Website

www.threatblockr.com

Product Features

Network Access Control (NAC)

Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access

Product Features

Network Access Control (NAC)

Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access

Alternatives

TruNAC Reviews

TruNAC

Wise-Mon
Aruba ClearPass Reviews

Aruba ClearPass

Aruba Networks
MetaAccess Reviews

MetaAccess

OPSWAT
Forescout Reviews

Forescout

Forescout Technologies