Lan-Secure Logo

Lan-Secure Products Center

Network Management and Security


Lan-Secure Network Management and Security Products
Find how to control your network
Learn more about our network management software products for network monitoring and network security to take control over your network simply and easily.

Switch Center - Network Management Monitoring Software
Switch Center delivers network management for monitoring topology, performance and mapping solutions.

Switch Center is network management software for network monitoring of managed switches, routers and hubs from any vendor supporting SNMP BRIDGE-MIB that helps to discover, mapping and analyze networks topology and performance.

Switch Center can be connected through any network port without the need of remote agents or special network management configuration. The unique network monitoring engine provides complete network topology and performance of local and remote network nodes and interconnecting devices trunks. The software monitoring options support SNMPv1/2 and SNMPv3 discovery options including VLANs monitoring engine. The built-in central viewer supports multiple management levels and provides automatic network monitoring and mapping using OSI Layer 2 and Layer 3 topology. The software management capabilities include real-time reports, statistics and alerts.


Free TrialLearn More
Switch Protector - NAC Network Access Control Management Software
Switch Protector delivers NAC network access control management that implements 802.1X on network switches.

Switch Protector is add-on engine of Switch Center software that provides Network Access Control (NAC) features on any managed network switches and hubs from any vendor supporting SNMP BRIDGE-MIB and helps to protect networks from potential intruders, unauthorized connections and malicious activities.

Switch Protector Network Access Control (NAC) software engine implements IEEE-802.1X features without the need for any special considerations for network switches or workstations. The software powerful engine provides real-rime intrusion detection and prevention based on selectable proven protection techniques including network nodes properties, activity and installed components. The software protection methods and rules can enforce any network security policy and can be implemented on all network switches or on specific selectable switches. The built-in central viewer supports multiple management levels including E-mail alerts, SNMP traps and SYSLOG notifications that provides maximum administration control and management capabilities.


Free TrialLearn More
Device Protector - DLP Endpoint Device Control Security Software
Device Protector delivers endpoint device control and Data Loss Prevention (DLP) security software for enforcing device protection policies.

Device Protector is Data Loss Prevention (DLP) and endpoint device control security software that enforce device protection policies on organization computers. The software helps to secure IT environments from un-trusted endpoint devices and prevent data leakage and information theft.

Device Protector can be deployed through the software management console or through any 3rd party deployment system by using the software deployment MSI package. The software provides online and offline protection including read-only, read-write, and working hours options. It can also provides exclude users and exclude media serial numbers capabilities. The software support all Windows operating systems and can protect the following devices: Bluetooth, DVD/CD-ROM, Firewire, Floppy, Imaging, Infrared, Microphones, Modems, Portable Mobile Phones, Ports, Printers, Removable Disks, Sound, Tape Drives and Wireless network devices.


Free TrialLearn More
Wireless Protector - Auto Disable Wireless when LAN connected
Wireless Protector automatically disable wireless and endpoint devices on windows / Mac-OSX computers that connected to active LAN cable.

Wireless Protector is automatically disable wireless when LAN/Ethernet is detected on computers that connected to the network with wired cable and re-enable the protected devices on disconnect. The software wireless auto switching capability helps to secure IT environments from un-trusted connections and prevent computers from using duplicate network resources.

Wireless Protector is acting as a server to all protected computers and can be deployed through the software management console or through any 3rd party deployment system by using the software deployment MSI/OSX installation package. The software powerful engine can secure any number of computers by installing a remote service on the protected computers. It provides easy-to-use network administration interface including auto discovery, auto scanning, reports, actions, exporting capabilities, database support and remote administration console. The software support Windows or Mac-OSX operating systems and can protect the following devices: Bluetooth, Firewire, Infrared, Modems, Portable Wireless Phones, Removable USB and Wireless 802.11 and Broadband (3G / 4G / WiMax) network devices.


Free TrialLearn More
Security Center - Network Management Protection Software
Security Center delivers intrusion detection IDS and prevention IPS management for network security solutions.

Security Center is network management software for network security that implements real-time intrusion detection IDS and prevention IPS and helps to protect networks from potential intruders, unauthorized connections and malicious activities.

Security Center can be connected in any network either it is switched or hubs network without the need of remote agents or special network management configuration. The unique network monitoring engine provide real-time threats and vulnerabilities discovery. The built-in manual and automatic network monitoring protection rules enable to enforce any network security policy with proactive blocking of network nodes that violated the security protection rules. The software can be used in distributed environment using any number of remote network management viewers for controlling the network security permissions and operation status. The built-in central software management viewer support local and remote sites including online reports and alerts.


Free TrialLearn More
Burn Protector - Secure Burning Management Software
Burn Protector delivers secure burn management of CD/DVD/Blu-ray devices by implementing files, folders and users permissions.

Burn Protector is CD/DVD/Blu-ray burning security management software that implements burn permissions on protected computers. The software helps to secure IT environments from burning sensitive data and prevent organization information theft.

Burn Protector can be installed through the software management console or through any 3rd party deployment system by using the software deployment MSI package. The software enables read-only access to the protected computers burning devices through its own secured burning interface. Its powerful engine can protect any number of computers and monitor the protected computers for active burning permissions. The software provides easy-to-use network administration interface including auto discovery, auto scanning, reports, actions, exporting capabilities and database support. The software also collects burning events and configuration changes that help network administrators to track and maintain the protected computers.


Free TrialLearn More
Documents Protector - Document Security Management Software
Documents Protector delivers document security management by implementing discovery, alerting and blocking of protected words and phrases.

Documents Protector is document security management software that implements discovery, alerting and blocking of documents that includes protected words and phrases. The software helps to secure IT environments from writing confidential and sensitive data to documents and prevent organization information theft.

Documents Protector can be installed through the software management console or through any 3rd party deployment system by using the software deployment MSI package. The software is tracking write operations in selected folders on the protected computers and search for the selected restricted words and phrases. Its powerful engine can protect any number of computers and monitor the protected computers for active documents protection. The software provides easy-to-use network administration interface including auto discovery, auto scanning, reports, actions, exporting capabilities and database support. The software also collects documents protection events and configuration changes that help network administrators to track the protected computers.


Free TrialLearn More
Inventory Center - Windows Asset Management Software
Inventory Center delivers windows asset management using WMI protocol service for servers and workstations.

Inventory Center is real-time windows inventory asset management software that using WMI service for monitoring servers and workstations operating systems. The software provides automatic monitoring, reports, actions and exporting capabilities.

Inventory Center software can be operated on any network environment without the need of remote agents or special network configuration. It is using the already installed WMI (Windows Management Instrumentation) service to explore operating systems of windows servers and workstation. The monitoring inventory asset includes Computer, System, Devices, Programs, Processes, Services, Updates, Exchange and IIS server properties and open ports scanning. The software powerful monitoring engine can support any number of windows servers and workstations and provides real-time monitoring, reports and actions like rebooting and processes and services control options. The software is also providing custom actions like command execution, email forwarding and syslog notifications as well as database exporting capabilities.


Free TrialLearn More
Configuration Center - Network Configuration Management Software
Configuration Center delivers network configuration management for SNMP devices from any vendor.

Configuration Center is real-time windows based network configuration management software for Telnet SSH and SNMP devices from any vendor that backup configurations, monitor history changes, compare changes and restore configurations of network devices.

Configuration Center software is designed to save time and reduce configuration errors in distributed administration environment by monitoring and collecting devices configuration from any network location. The software monitoring engine can be operated manually by user request or run automatically on specific dates and times. The software can provides dynamic actions like executing commands or sending specific SNMP trap or email on specific configuration changes. It can also provides reporting, logging and exporting capabilities that can be used for enhanced management of current and historical network devices configuration.


Free TrialLearn More
Syslog Center - Network SYSLOG Management Software
Syslog Center delivers syslog server monitor for syslog management and correlation monitoring solutions.

Syslog Center is real-time network management and monitoring server daemon for syslog events that collects messages and notifications from any network device and helps to monitor, analyze and correlate network events in IT environments.

Syslog Center implements syslog server monitoring daemon. The powerful software monitoring engine can analyze any number of syslog events in real-time and perform special actions and correlation reports upon receiving specific network messages and events. The software can also be used as central monitoring engine with exporting capabilities such as database and textual log files that can provide online and historical repository for network administrators. The software built-in viewer can provide advanced syslog reports including root cause analysis that can in used in heavy loaded IT environments.


Learn on WindowsLearn on Mac-OSX
TR-069 Manager - Windows ACS for CWMP management
TR-069 Manager delivers windows ACS for CWMP management of remote CPE sites.

TR-069 Manager is real-time windows based software for CWMP management that provides ACS capabilities to manage remote CPE sites and helps to get and set parameters, view statistics and perform actions on any TR-069 supported devices.

TR-069 Manager software is providing intuitive user interface that provides collection of TR-069 categories to support any CPE device. The software CWMP management engine support any number of remote CPE sites with different ACS capabilities that includes parameters, statistics and actions with connection and operation logs. The CPE and ACS settings of the software includes port numbers selection with optional username, password and proxy settings that support any type of remote connections.


Free TrialLearn More