Current page : IP Management Solution > IP Management Solution(TCO!secuIP) > Introduction
Centrally controlled IP management in
real-time Integrated IP Management System
TCO! SecuIP is an effective IT Resource system
that integrates and manages complex and diverse
IPs on the network configuration.
TCO! SecuIP is an effective IT Resource system
that integratesand manages complex and
diverse IPs on the network configuration.
Using the current manual management has high security risk and is
difficult to control the endpoints connected to the internal
network from security breaches, information leakage and
other network related threats. Therefore, a tool that enhances
the concept of network resource management
and security tool are needed.
Current page : IP Management Solution > IP Management Solution(TCO!secuIP) > Features
Obtain all the company’s IP Asset in real-time
From the time of installation, we collect the company’s IP recourses real-time to identify all
the IP and devices that are being used.
Check on-line and off-line state in real-time
It is possible to check all the on-line and off-line endpoints real-time.
Distinguish various devices
You can check various devices such as Windows, Linux, printer, iPhone, iPad,
Android phones, Blackberry phones and internet phone.
Check VoIP phone’s telephone number
You can detect VoIP phone, meaning Internet phone and its number to manage all
the internet phones that are being used inside the company.
Prevent pirate use of IPs
You can block the endpoints that uses arbitrary IP to access the network
without the administrator’s permission.
Setting DHCP IP allocation
By using self-developed DHCP server which allocates IP, specific endpoints are given
same IP, so that it is easy to figure out specific devices or users that use the designated IP.
Protect IP main devices clash
Protect the IP of critical equipment such switch, router, server from IP clash,
to secure important devices from possible network attack or error.
DHCP Server dualization through Helper IP
When there is a problem with allocating IP due to problem with agent device that are
being used at the office, through Helper IP, IP can be assigned by
the central server so that network works seamlessly at all time.
Switch Port Detection and Port Control
Switch ports connected to each endpoint can be checked and managed. In case of particular
endpoints security problem, the corresponding switch port is detected, and the communication is
blocked. This process is like the communication personnel directly going to communication
room to pull out the LAN cable from the switch port. Therefore, much more
convenient and prompt action can be taken.
IP Request Function
New employee or partnership company’s visitor can use the network using
assigned IP by applying through IP application page.
Setting IP period of permission
Partnership company or outsourcing partners are given set amount of time to use IP.
When that period of time passes, IP usage is controlled automatically to maintain internal security.
IP Automatic circulation
IPs that have been off-line for a long time are considered to be unused IP and automatically
collected to prevent from being used for malicious purposes.
Control Exception through maker or authorization MACS
Specific endpoint manufacturer or an authorized MAC address can be given exceptions
from various IP control policies. Through this function, those who go on business trips,
using provided smartphones or VoIP phones can use the network conveniently.
Recent online, offline time check
Recent on-line and off-line time can be checked.
IP usage history management
It is easy to figure out IP usage, and report can be printed.
Extract all the data on console
All the data that are shown on administrator’s console can be printed
in excel form to edit more conveniently.
Induce PC agent installation
PC agents that are developed by MLsoft can be installed to all the PCs in the company.
Current page : IP Management Solution > IP Management Solution(TCO!secuIP) > Strengths
Patented “Fake Gateway” Technology can be applied to any network environment easily.
Wired and wireless Network Access Control System
MLsoft’s Fake Gateway Patented technology carry networking engine so that the system can be installed to even the most complicated network configuration environment. This technology is proven over the last decade and is already operating steadily in more than hundreds of mid-to large scale clients.
Block Stage 1 [Logical block]
It is a basic block technology. Upon finding abnormal traffic, it immediately shuts down the communication.
It is a technology that maintains network operation while fighting with worm and defending the network.
In the worst case, it may not be able to prevent the switch load.
Block Stage 2 [Physical block]
By directly shutting off problematic device and connected switch port, it effectively shuts down similar
to a process of physically pulling out the LAN line. It is not an administrators’ manual shut down but
smart cut-off technology that automatically figures out anomaly and shut it off.
We offer faster speed than any existing networking technology.
We detect events that happen to the device and report to the administrator
Real-time such as the endpoint network connection, on / off status, IP collision and so on.
Numerous types of endpoints can be checked by their types
Such as an android phone, iPhone, iPad and Blackberry.
By being able to detect and check window OS, Linux OS, Printer and internet phone’s number real-time,
it is able to figure out which device is connected instantaneously.
As an endpoint networking technology accumulated for over 10 years, it can be installed and used to any network environment safely and easily.
Current page : IP Management Solution > IP Management Solution(TCO!secuIP) > Structure