For closed networks, industrial control equipment networks, security networks, etc.
Other than allowed communication rules (whitelist)
Security switch that blocks all other communication In response to intelligent attacks
Whitelist-based security switch
Why doesn’t the security incident decrease?
By blurring the boundaries of the network with technologies such as mobile and cloud!
The biggest threat to security threats is internal users!
Security department in limited resources, hard to decide where to focus!
Whitelist security that only allows “safe” to be proven
The communication path is set according to the authority of the internal user or terminal (White-List base Security), and all communication other than the registered path is blocked to prevent security threats caused by indiscriminate communication by internal users.
Implement whitelist security at the network switch level
Internal security can be enhanced by controlling the communication path of all network devices using Ethernet regardless of the type of internal terminal and OS.
Non-Agent based communication blocking and control
You can control the communication path using a network switch without configuring separate probe and agent installation.
Apply integrated security policy to remote networks
In addition to the internal network, the same security policy is applied to the remote network to maintain a uniform and advanced security policy even in various environment changes such as internal terminal movement and department movement.
Network service, integrated management of internal terminals (intelligent integrated management)
You can monitor real-time services, protocols, and users using the network, and you can manage the internal communication path by limiting the users who use the service or by specifying the allowable services for each user depending on the environment. .
Whitelist-based communication path control
Policy by IP, service port, and group
WhiteList, BlackList policy applied
Provides notification function when WhiteList is violated
Automatic detection and blocking when cable looping occurs
Bundling software (VNM) allows for the location of roofing to occur immediately
Automatic recovery of switch ports when looping is released
Network integration control
Unauthorized user access control
Real-time internal IP management
Internal asset management
Configure network topology
Difference Between General Switch And WhiteList Security Switch
WhiteList security switch
Whitelist Security Solution
01. Protecting critical systems and services
Main system (equipment, server, etc.) protection (access control)
Prevention of data leakage
Preventing useful backdoor
02. Blocking abnormal traffic detection
APT defends against malware attacks
Prevention of security accidents that are difficult to predict
Enhancement of internal network safety through prevention of secondary infection and spread
03. Illegal access control
Security management of external import equipment
Use time, access permission system/service designation
Save communication log (for future accident investigation, audit use)
Unauthorized access control
Securing network device visibility
04. Blocking unnecessary communication by internal users
Control the communication path of the internal terminal
Control according to the use of network terminals by user, protocol, and group
Printers and multifunction devices, CCTV, IP phones
Cooling/heating devices, access control devices, various control systems, etc.