Lan-Secure Logo

Lan-Secure Security Center

IDS IPS Network Access Protection


Security Center Datasheet

Product Overview

While security today, takes a role position in network protection from outside the organization by controlling network access of firewalls, anti-virus gateways and other security devices. Most malicious security threats that actually cause damage occur by intruders that using network access from within the organization.

Security Center network access protection software designed to provide real-time network security monitor for intrusion detection IDS and prevention IPS that helps to protect networks from being vulnerable to unauthorized network connections, malicious network activities and potential network intruders. The software security scanner enables real-time protection on new network connections or any network changes including suspicious network activities and proactively prevents their access to the network.

Security Center can be connected in any network either it is switched or hubs network without the need of remote agents or special network configuration. The real-time access protection monitoring engine provides automatic network and security scanning including threats and vulnerabilities discovery. The built-in manual and automatic access protection rules enable to enforce any network security policy with proactive blocking of network nodes that violated the selected security protection rules. The software can be used in distributed environment using any number of remote viewers for network access control of protection and security permissions.

Quick Tour

Take a quick tour to learn more about the software unique capabilities that will help you to manage your network WiFi computers.

Selectable Security Engines

Selectable Security Engines

Selectable detecting and monitoring engines including Vulnerability, Threats, Wireless, Users and Snmp for best compatibility with network security and customer needs.

Security Mapping Views

Security Mapping Views

Graphical hyperbolic mapping of network security topology including activity, vulnerability, threats and protected nodes diagrams with search and trace capabilities.

Security Performance Views

Security Performance Views

Graphical network security threats statistics monitoring including Unicasts, Multicasts and Broadcasts of top ten network nodes or specific selected node performance.

Network Nodes Monitoring

Network Nodes Monitoring

Monitoring and mapping display of network nodes including their activity, vulnerability and threats bars, search and filtering capabilities and detailed security information.

Network Protection Monitoring

Network Protection Monitoring

Monitoring and mapping display of network protected nodes including their protection status, blocking time and blocking reason with search and filtering capabilities.

Intrusion Detection Protection

Intrusion Detection Protection

Intrusion detection IDS provides access to detection settings including New and Changed end-user properties, Threatened nodes and linkup WMI and script properties.

Intrusion Prevention Protection

Intrusion Prevention Protection

Intrusion prevention IPS provides access to prevention settings including nodes blocking notification, built-in network and scripts prevention and schedule properties.

Detection and Prevention Alerts

Detection and Prevention Alerts

Network detection and prevention alerts provide access to security protection messages including intrusion detection and prevention of nodes that may damage the network.

Multiple Viewers Support

Multiple Viewers Support

Unlimited remote software viewers can be installed for multiple network administrators and operators for online intrusion detection and prevention of network security.

Users Viewing Permissions

Users Viewing Permissions

Selectable viewing permissions can be set on software remote viewers for multiple network administrators and operators to control network management activities.

Database Export Capabilities

Database Export Capabilities

Export database capabilities using standard HTML or SQL for convenient API to security collection information including intrusion detection and prevention events and alerts.

Network Security Methods

Network Security Methods

Selectable network segments protection monitoring and mapping options including multiple network adapters and 802.1Q VLAN support with specific nodes exclude list.

Network Alerts Forwarding

Network Alerts Forwarding

Selectable forwarding alerts methods for multiple recipients including MAPI or SMTP emails, SNMP traps and SYSLOG messages for convenient network management.

Daily/Weekly Alerts Reports

Daily/Weekly Alerts Reports

Email reports including daily and weekly alerts details, network security information and protected nodes details for authorized network managers and administrators.

Key Features

Learn more about the software key features to complete your knowledge about the available operating capabilities that the system has to offer.

  • Provides online network security and protection monitoring.
  • Automatic network monitoring of threats and vulnerabilities level.
  • Network access protection using organization policy enforcement.
  • Real-time manual and automatic access protection rules against potential intruders.
  • Real-time access protection using intrusion detection IDS and prevention IPS services.
  • Real-time nodes display for analyzing network connections and transmission rates.
  • Real-time access protection using MAC, IP, DNS name or Username attributes.
  • Proactive network access protection using threat and vulnerability levels.
  • Alerts forwarding using SMTP, SNMP, SYSLOG and Commands.
  • Support wireless intrusion detection and prevention.
  • Daily and weekly e-mail reports.
System Requirements

Verify the pre-installation requirements of the software to ensure smooth and easy installation and operation on your network.

  • Computer Browser: Microsoft Internet Explorer 6.0 or higher
  • Computer Platform: A 800 MHz or faster processor with at least 256 MB of RAM
  • Operating Systems: Microsoft Windows 2000 / XP / 2003 / Vista / 2008 / 7 / 2012 / 8 / 10