Modules for ARP-GUARD
Our ARP-GUARD extensions
The solution for your application

Captive Portal – secure and convenient guest access
ARP-GUARD Captive Portal controls network access for guest or third-party components such as smartphones and notebooks. Targeted and restricted network access can be determined for third-party devices in any environment, whether LAN or WLAN. Access can be controlled at any time by the use of a dynamic firewall ruleset. The sensor management architecture enables a guest portal to be deployed across multiple locations.
BYOD (Bring Your Own Device) is easy and convenient to implement – private end devices are only granted access to resources that have been explicitly approved for this purpose by the rules. Authentication is carried out via MAC / user password, LDAP access e.g. to Active Directory.
The advantages to you at a glance:
- Secure and convenient guest access
- BYOD for employees, visitors and maintenance technicians
- Guest portal with self-registration
- Integrated dynamic firewall

Endpoint - network integrity up to the end device
ARP-GUARD Endpoint provides valuable support for implementation of compliance requirements. During authentication, the system checks whether end devices comply with security policies and are “compliant” with regard to security-related details such as the status and pattern of the antivirus program or the patch level of the operating system. Checks are carried out via WMI, SNMP traps and syslog, interfaces with AV servers, IPS systems. A client installation is not required for this. Devices that do not comply with the policies are isolated and can obtain the required updates in a quarantine VLAN, for example. Only then do the systems regain access to the respective network areas.
The advantages to you at a glance:
- Agentless testing system
- Enforcement of security policies and compliance guidelines
- Checking of security-related properties such as antivirus patterns and patch level
- Guarantee of network integrity all the way to the end device
- Automated measures in case of rule violations (quarantine VLAN)

Cluster - high availability for sensitive IT areas
ARP-GUARD Cluster provides “ready-to-work” server replication with low software and hardware costs. ARP-GUARD Network Access Control thus offers greater resilience and scalability for critical IT systems. Particularly in healthcare or time-sensitive production processes, availability and system security are of equal priority. With a geo-redundant cluster solution, maximum system availability is guaranteed in the worst-case scenario.
The advantages to you at a glance:
- High availability for sensitive IT areas
- Maximum reliability for critical infrastructures
- Out-of-the-box server replication
- Mix of virtual instance and appliance is possible

Enterprise Management – homogeneous IT security across the group
ARP-GUARD Enterprise Management is a fully multi-client capable extension of our ARP-GUARD Network Access Control solution based on sensor management architecture, and opens up significant savings potential in the corporate environment by enabling centralized orchestration and protection of distributed and heterogeneous network environments with over 100,000 end devices. For the purposes of deeper analysis, a central data interface is also available for connection to common SIEM systems and security operations centers.
The advantages to you at a glance:
- Orchestrate global corporate structures centrally
- Multi-client capable system with maximum availability
- Central set of rules can be operated with site-specific rules
- Unlimited MAC address/device capture

Agent – intelligent vulnerability and risk management
ARP-GUARD Agent “powered by Infinipoint” extends the functionality of our network access control solution to include intelligent vulnerability and risk management. Integrated threat intelligence is used to determine the real threat potential of a vulnerability, taking into account the Common Vulnerability Scoring System (CVSS) as an industry standard. The focus here is on the real risk score, which reflects the vulnerability and the degree of exploitation of the vulnerability. Prioritizations and recommendations for action are provided accordingly.
The advantages to you at a glance:
- Agent-based testing system
- Vulnerability management with real risk assessment in real time
- Intuitive “one-click remediation” procedure
- Compatible with Windows, macOS, Linux and IoT devices
- Common Vulnerability Scoring System (CVSS) as industry standard