DTS Network Access Control (NAC)

Network Access Control (NAC)

Network security today is much more than just a technical discipline—it is a central component of digital sovereignty. Those who relinquish control over their network also relinquish control over data, processes, and business models. Especially in times of increasing regulatory requirements, growing cyber threats, and geopolitical uncertainties, it is crucial to be able to rely on trustworthy, transparent, and German/European security solutions.

With our NAC, we have been offering a powerful solution for network access control since 2003 that meets precisely this requirement. The technological basis is our proprietary ARP-GUARD solution – one of the world's first NAC solutions and one of the few established network access control systems that is completely “Made in Germany.” 

As a German manufacturer of security software, we stand for technological independence, high development standards, and long-term reliability. With ARP-GUARD, we enable network access control on a par with international providers – without compromising on security, transparency, or integration capabilities.

Dennis Heidebrecht
Deputy Manager Sales - Cyber Security
+49 2203 599-4911 Contact

At a glance

Next-Gen Network Access Control
Made in Germany - since 2003

Maximum visibility & inventory

All known and unknown devices are detected and inventoried in the network

Unique fingerprinting

Fingerprint for unique device identification for secure access decisions

Centralized policy enforcement

Security rules are defined in real time and enforced automatically.

Network segmentation

VLAN management segments internal, sensitive, and guest areas to minimize risk

Identification of vulnerabilities

Vulnerability and risk assessment according to CVSS with current threat situation

 

Flexible authentication

Mixed operation with SNMP, MAC-RADIUS, and 802.1X—all with the same range of functions

Scalable & multi-client capable

Centrally manageable across multiple locations & large networks

CLIENT-GUARD

Agent for enforcing compliance policies and assessing security statuses for devices outside the company network

The solution

Our Network Access Control (NAC) & add-ons in detail:

ARP-GUARD supports you in implementing a network-based zero trust model that mistrusts every access and uniquely authenticates every connection. 

Our fingerprint technology identifies devices beyond doubt and only allows network access for authorized devices. Every network access is recorded and evaluated in real time and immediately reported in case of anomalies, ensuring maximum transparency, control, and security. 

Centralized orchestration, dynamic rulesets, and VLAN segmentation enable you to reliably protect sensitive areas. Thanks to the scalable sensor architecture and enterprise management, you can secure your company across locations with separate tenants and georedundancy. 

Regardless of manufacturer or technology, you benefit from our multi-vendor strategy and can seamlessly integrate ARP-GUARD into your existing IT infrastructure.

 

 

 

Basic Functions

 

Network Access Control
Detects devices in real time, prevents unauthorized access, and protects against hard-to-detect attacks such as MAC spoofing using mechanisms such as fingerprinting and VLAN management. Flexible rules, interfaces, and integrations into SIEM or monitoring systems allow security measures to be automated and networks to be secured regardless of manufacturer.

Fingerprinting
This technology creates a unique digital fingerprint for each device based on characteristic features, reliably preventing MAC spoofing and unauthorized access. Multi-fingerprinting, comprehensive protocol support, and automated rules ensure a high level of security comparable to 802.1X, but with significantly greater flexibility. This also applies to devices that do not support certificate-based authentication.

Device Detection
ARP-GUARD provides complete transparency of all devices on the network, records their connections in real time, and displays the information in a graphical topology. The integration of SNMP, automated queries, and reporting enables efficient network monitoring, rapid troubleshooting, and compliance with audit and review requirements.

Network Segmentation
This allows networks to be segmented centrally, independently of manufacturers, and automatically, clearly separating and protecting sensitive and public areas. Devices automatically receive the appropriate VLAN across locations, while captive portals, flexible rules, and central management enable simple and secure handling.

Sensor Management
Enables centralized, highly scalable management of distributed networks with an unlimited number of sensors, making it particularly suitable for companies with multiple locations. Enterprise Management extends this flexibility to global organizations with typically over 100,000 devices in multi-tenant environments.

 

 

Modular Extensions

 

Captive Portal
Enables secure and controlled network access for guests and BYOD devices, which can be individually restricted by rules. It can be used across locations, is fully customizable to your corporate design and supports convenient procedures such as self-registration or sponsorship.

Endpoint
Checks endpoints agentless, within the network, during authentication for compliance and security policies such as antivirus status or patch level. Non-compliant devices are automatically isolated until they meet the requirements, ensuring network integrity down to the endpoint.

Layer 2 IPS
Monitors network traffic in real time, detects man-in-the-middle attacks such as ARP poisoning or MAC spoofing, and automatically defends against attacks according to defined rules. This ensures a high level of protection against internal threats and maximum transparency regarding the sources of attacks.

Cluster Management
Ensures highly available, uninterrupted operation of critical IT systems through automatic server replication and georedundant failover. In the event of a failure, a backup system seamlessly takes over all functions, ensuring maximum system security and availability.

Enterprise Management
Centralized control of multiple independent instances, allowing configurations, policies, and log data to be synchronized and managed across locations. Local systems remain self-sufficient, while multi-tenancy, single sign-on, and centralized security monitoring support operation in large, complex network environments.

CLIENT-GUARD
Enforces compliance policies even for devices used outside the company network. It collects device information, evaluates security statuses such as installed software and version levels, and uses central rules to decide who has access or is blocked from remote access, ensuring a high level of protection even for remotely used clients.

 

Your advantages:

 

  • Full range of authentication methods enables mixed operation of SNMP, MAC-based RADIUS, and 802.1X with the same feature set.
  • Hybrid use of MAC and 802.1X authentication achieves complete NAC coverage; subsequent migration from SNMP to 802.1X is easy to implement if required.
  • One of the fastest implementations on the market in just 4 steps (device identification and localization / classification of devices / definition of individual responses/rules/activation of the rule set), optionally with a hardened physical and/or virtual appliance.
  • Our solution can be used independently of technology and manufacturer. This allows you to homogenize your network in terms of network security and management without the need for additional investment in your existing infrastructure.
  • Orchestration of any number of locations, clients and devices with our enterprise management using revolutionary and highly scalable sensor management architecture.
  • Intelligent vulnerability and risk management in real time based on the industry standard Common Vulnerability Scoring System (CVSS), considering the real threat situation.
  • Our solution supports you, especially in the area of critical infrastructures, with important certifications such as ISO/IEC 27001, TISAX, ISO 27799, DIN EN 80001-1, DORA, PCI-DSS, IT-Grundschutz, B3S standards, and NIS2.
  • ARP-GUARD effectively prevents difficult-to-detect MAC spoofing and ARP poisoning attacks and significantly increases the security level of your network.

 

 

With ARP-GUARD, companies are consciously opting for a European solution in the field of network access control. As a pioneering solution, ARP-GUARD stands for technological independence and a clear decision not to make security-critical infrastructure dependent on non-European conditions.

For us, “Made in Germany” means more than just a seal of origin: it stands for development, data processing, and quality standards within the European legal area—transparent, verifiable, and in line with local data protection and security requirements.

Our goal is to establish resilient network security as a European quality standard.

Need more information?

Our ARP-GUARD Network Access Control is Zero Trust NAC
of the next generation. Learn more here:

ARP-GUARD Website
Customers
Sectors

    Related solutions & services

    Product

    DTS Cockpit

    Product
    Product

    DTS Identity

    Product
    Product

    DTS Security Operations Center (SOC)

    Product
    Product

    Next-Generation Firewall

    Product

    Let's have a talk!


    Get free and easy advice.


    ARRANGE A CONVERSATION

    Dennis Heidebrecht
    Deputy Manager Sales - Cyber Security
    dennis.heidebrecht​@​dts.de+49 2203 599-4911
    Contact
    Support
    Newsletter
    Cloud Portal

    How to reach us:

    Support

    Hotline

    To open a ticket, simply call our 24/7 hotline:
     

    +49 5221 1013-032

    Email

    To open a ticket, simply email us with your technical issue:
     

    support​@​dts.de

    Web frontend

    Enter new tickets in the web frontend, view and classify all open tickets etc.

    support.dts.de

    Remote support

    Enables remote connections to your endpoints:
     

    support-remote.dts.de

    Subscribe now!

    Current information about DTS, our products, events and other news about the entire group of companies.

    DTS in general

    Login

    DTS Systeme Muenster

    Login

    DTS Cloud Portal

    The DTS Cloud Portal is our platform for you to easily and flexibly add and manage your DTS Cloud products and services. The intuitive platform allows you to configure selected products individually and thus adapt them exactly to your requirements.