Arpguard for mac
Virtually all internal company information can be accessed over your local network.
It offers preventative protection against attacks that is easy to put into practice. IP spoofing attacks are prevented to keep specific rights in the network from being obtained fraudulently.īy identifying address conflicts, ARP-GUARD makes a valuable contribution to quality assurance. Secret product developments and internal company passwords are secure against unauthorised access. Thanks to this protection, data can no longer be spied on, deleted or manipulated unnoticed.
ARPGUARD FOR MAC MAC
ARP-GUARD detects and locates internal attacks such as ARP poisoning, MAC flooding, IP spoofing, "man-in-the-middle" attacks, etc. Simple access to your company data - not just for employees! Security problems at the network infrastructure level can put the availability of the entire network at risk or allow an attacker to read or even manipulate the traffic of complete network segments. There are numerous network connections and access points in the company that are either freely or easily accessible. The form and size of the topologies can be edited and modified any way you want. The network infrastructure is automatically detected by ARP-GUARD and shown in its form. To ensure that you don't lose your overview in large, complex networks, ARP-GUARD offers you a topology diagram. This lets you create analyses that help you to get an overview of events in your network - for example the number of unknown devices that want to access your network or the frequency of incidences on certain ports or switches. You can select between standardised and user-specific reports here. The reporting function of the ARP-GUARD also lets you show the logged incidents in a diagram. With the help of this history you can identify when a specific device was in the network the last time and where was it connected, or which IP address was connected to what device at a specific time? ARP-GUARD also supplies you with a history of the topography. Inventory lists of all of the devices located in the network are generated upon request and are always up-to-date. It detects every change in addresses or allocations and logs and displays these changes. The central network management system provides a comprehensive overview of all devices in your network.