Services Compliance About Us Customers Contact Us
SK|EN
Back to Services
08 — Network Management

ADDNET – Network Management

Who is connected to your network? ADDNET provides complete visibility and control over every device — IP, MAC, VLAN and NAC policy in one place.

IPAM
IP address space management
NAC
Network access control
DHCP & DNS
Centralised network services
What's Included

Complete Network Infrastructure Management & Visibility

ADDNET covers the full lifecycle of network resource management — from IP address allocation to device access control — with a central overview and audit log for compliance.

IPAM — IP Address Management
Centralised inventory and management of the entire IP address space — subnets, VLANs, assignments, utilisation and change history with a full audit trail.
DHCP Server Management
Centralised management of DHCP servers, scopes, reservations and options — with failover configuration and historical records of assigned addresses.
Internal DNS Zone Management
Management of internal DNS zones, A/PTR records and DNS policies — automatic synchronisation with DHCP for consistent reverse records.
Network Device Inventory
Automatic discovery and inventory of all devices on the network including MAC address, manufacturer, OS, switch port and connection history.
NAC — Network Access Control
Network Access Control — defining policies for permitted devices, automatic blocking of unknown devices and BYOD quarantine.
VLAN Management & Segmentation
Visual VLAN structure management, automatic VLAN assignment to devices by policy and network segmentation documentation.
Unknown Device Detection
Real-time notifications when an unknown device connects to the network — instant alert for the IT team with switch port identification.
Automated Address Assignment
Rules for automatic IP range and VLAN assignment by device type, department or location — no manual configuration required.
AD/LDAP Integration
Integration with Active Directory — device-to-user mapping, policy enforcement by group and automatic updates on AD changes.
Reporting & Audit Log
Complete audit log of all network infrastructure changes — who, when and what changed — for internal audit and compliance reporting.
Visual Network Map
Automatically generated topology map of the network with current device status, connections and VLAN structure for rapid orientation and troubleshooting.
Network Change Management
Controlled change process for network infrastructure — approval workflow, change documentation and rollback plan for every configuration change.
Who It's For

Who Needs ADDNET Network Management

  • Mid-size and large companies with extensive network infrastructure needing centralised management
  • Multi-site organisations with multiple locations and decentralised IP addressing
  • Industrial environments with OT/IoT devices requiring network segmentation and NAC
  • NIS2 and Cybersecurity Act entities required to maintain asset inventory and control network access
  • Organisations with a BYOD policy needing control over personal devices on the network
  • IT teams plagued by recurring IP conflicts, unknown devices and manual address management
Problems We Solve

What Happens Without Network Management

  • IP conflicts cause outages — two devices with the same address disrupt communication
  • Unknown devices on the network — no one knows what is connected and through which switch port
  • No network segmentation — malware spreads laterally across the flat network unchallenged
  • BYOD without control — personal devices with malware accessing corporate resources
  • Audit reveals absence of asset inventory as a critical gap in NIS2/ZKB compliance
  • IT team spends hours manually tracking IP conflicts in sprawling Excel spreadsheets
Regulatory Requirements

Network Management as the Foundation of Cybersecurity

Asset inventory and network access control are fundamental requirements of NIS2, the Cybersecurity Act and ISO 27001 — without knowing what is on your network, you cannot secure your organisation.

NIS2
Article 21 — Network Security
NIS2 requires implementation of network system security including access control, network segmentation and monitoring — ADDNET covers these requirements comprehensively.
ZKB
Decree 362/2018 — Network Security
The Cybersecurity Act requires inventory and management of network infrastructure, network access control and documentation of network architecture for essential and digital services.
ISO 27001
A.13 — Network Security
ISO/IEC 27001:2022 Annex A.13 requires management of network security including segmentation, access control and monitoring of network traffic.

Gain Full Visibility Over Every Device on Your Network

Contact us for a free consultation. We will assess your network infrastructure and design a tailored ADDNET implementation.