This solution falls within the technology:

Active Network Security

Most of today’s networks is protected from Internet attacks, considered to be the greatest security risk. An overwhelming majority of attacks at corporate networks is lead from inside the corporation – from the local network. Corporate local networks are expanding, and it is often difficult to perform retroactive mapping of all active ports; standard Ethernet hubs are added by employees to increase the number of ports locally. At the same time, more and more users access the network wirelessly, both from company and private laptops, in addition to various mobile devices. It is almost impossible to find out who connected from what location, to what application and what data were transferred. We do not know the exact address plan, and we keep reserving addresses that are unused for a long time. In case of an attack, we are virtually defenseless, unable to identify the attacker.

Rigorous network access control technology can eliminate majority of security risks, and in addition it can optimize network operating expenses by the ability to make inventory of resources being used. Access control based on 802.1x allows for users’ authentication and dynamic user assignment to corresponding VLANs, and also to local or global locations, as the need may be. By network state monitoring we can identify a suspect user that can be deactivated remotely or transferred to a quarantine VLAN.

Using network monitoring by means of behavioral analysis method we can also identify unknown attacks based on deviations from normal behavior. In case of a larger-scale attack, we can switch the network into an emergency state with all the users disconnected, while the critical applications keep running. We use the same method to solve access of company Wi-Fi devices or private user devices (BYOD).


Solution advantages:

  • Secure local network access
  • Lower cost of network resources’ inventory
  • Safe use of users’ personal devices
  • Dynamic VLAN allocation by users or by locations
  • Discovery of unknown attacks based on behavioral analysis
More information Less detail
Contact product manager Products used in the solution
Active Network Security

blue, the colour of rivers, represents the flow of data communications -  Green, the indicator of starboard on ships will help with navigation and improve the quality of communications

Do you wish to receive our newsletter? Yes, I am interested



I give consent to the company VUMS Datacom, Ltd. based Lužná 591, 16000 Prague 6, ID: 48585611, registered in the Commercial Register of the Municipal Court in Prague, Section C, File 17811, to collect and process in accordance with law no. 101/2000 Coll. as amended, my name and e-mail address and other personal data provided for inclusion in the database in order to offer products, services and sending commercial messages by electronic means pursuant to applicable law no. 480/2004 Coll., on indefinitely until further notice.

Souhlasím se zařazením do databáze za účelem nabízení výrobků, služeb a zasílání obchodních sdělení prostřednictvím elektronických prostředků dle platného zákona č. 480/2004 Sb., a to na dobu neurčitou do odvolání.

Souhlasím se zasíláním newsletteru VUMS DataCom s informacemi, a to na dobu neurčitou do odvolání.