Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Enhance your SMB's security by utilizing a firewall designed to detect threats, eliminate viruses, and establish a secure VPN. Easily configure your firewall with user-friendly traffic rules to manage both incoming and outgoing communications based on various criteria such as URL, application, and traffic type. The Snort system offers continuous monitoring for suspicious activities, allowing you to log or block communications based on their severity level. It effectively prevents the infiltration of viruses, worms, Trojans, and spyware into your network. Beyond merely scanning files for harmful code, Kerio Control analyzes network traffic to identify potential attacks, ensuring a comprehensive security approach. Establish fast and secure server-to-server connections between your offices using Kerio Control’s straightforward VPN setup, or connect to a remote office that lacks Kerio Control by employing standard VPN protocols for added flexibility. This multi-faceted approach not only safeguards your network but also maintains high performance across all connections.

Description

Switch Protector serves as an additional engine for Switch Center software, delivering Network Access Control (NAC) by leveraging IEEE-802.1X features across managed network switch ports, thereby safeguarding networks against potential intruders, unauthorized connections, and harmful activities from within the organization. This NAC monitoring software functions as a robust security solution, integrating a diverse array of access protection rules aimed at both intrusion detection and prevention. Its real-time protection monitor is designed to identify new network connections or any alterations within the network, including detecting suspicious activities that could pose a threat. The software's built-in protection rules facilitate the enforcement of network security policies, ensuring proactive access control for any network nodes that breach the established security measures. Moreover, users can manage the protection engine through an integrated administration interface or via the organization's intranet web, providing an efficient way to control access permissions for authorized network nodes. As a result, Switch Protector significantly enhances the overall security posture of the network environment.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

No details available.

Integrations

No details available.

Pricing Details

$270 per year
Free Trial
Free Version

Pricing Details

$99 per 10 devices
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

GFI Software

Founded

1994

Country

United States

Website

www.gfi.com/products-and-solutions/network-security-solutions/keriocontrol

Vendor Details

Company Name

Lan-Secure

Website

www.lan-secure.com/SwitchCenterProtector.htm

Product Features

Firewall

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Product Features

Network Access Control (NAC)

Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access

Alternatives

Alternatives

Aruba ClearPass Reviews

Aruba ClearPass

Aruba Networks
FortiNAC Reviews

FortiNAC

Fortinet