Protecting your network from rogue devices just got real with the new User Device Tracker 3.0. With the latest release of UDT, you’re in control of who and what connects to your network. It’s like having your very own SWAT team at your fingertips.
No longer does your network have to be at the mercy of unknown or unsafe devices, which at the very least are consuming valuable IP space or bandwidth, and at the very worst, accessing confidential data or taking down the network.
UDT gives you the power to track endpoint activityand stop unwanted users and devices from wreaking havoc on your network!
Device Whitelisting: Define which devices are deemed safe for network access. Any devices connected to your network that are not on the whitelist will appear in the Rogue Devices resource list and an alert will be automatically generated.
Remote Port Shutdown: Being able to identify offending devices or unwanted network connections is one thing, but with no actionable controls, the problem remains unresolved. Therefore, it’s crucial to have controls like click-of-a-button port shutdown to stop threats and network problems in their tracks.
User Watch List: Flag users, in addition to devices, so you can be alerted every time they connect to the network. Whether for troubleshooting or security purposes, UDT will be your network’s watch dog.
So when you think SolarWinds User Device Tracker, think SWAT!
Secure network access
Whitelisting and watch lists
Active port shutdown
Tracking users and devices
SolarWinds User Device Tracker (UDT) delivers automated user and device tracking along with powerful switch port management so you can stay in control of who and what connects to your network. And, you can do it all from an easy-to-use, point-and-click Web interface!
SolarWinds solutions are rooted in our deep connection to our user base in the THWACK® online community.
More than 150,000 members are here to solve problems, share technology and best practices, and directly
contribute to our product development process.