macmon secure develops network security software, focussing on Network Access Control. Founded in 2003 macmon secure has grown from strength to strength, becoming the technology leader in the field of Network Access Control. Based in Berlin the macmon NAC solution is fully engineered in Germany. In 2014 due to ripening market conditions macmon expanded its presence into the European Market, opening up an office in the UK. Interest and demand has been strong with growth of more than 25% year on year.
macmon has a broad diverse range of customers varying throughout all industries, capturing SMB’s, medium sized enterprises through to large international corporations.
Our aspiration: Offering every company a flexible and efficient NAC solution. Which can be implemented with minimal effort, adding considerable surplus value for network security. macmon secure is a member of the Trusted Computing Group and actively involved in related research projects.
macmon NAC – smartly simple!
Figures & facts
2003 until today
Development of Network Access Control software (NAC)
Consulting, implementation, support, trainings for macmon security software
ICT, IT security and Network Access Control (NAC)
Public sector, healthcare, financial services, insurance, science, research, telecommunications, media, trade, industry, transport and logistics
Trusted Computing Group (TCG)
macmon secure GmbH has set itself the objective of providing the option to all the companies - regardless of size of the company and the sector - to control and secure their network accesses. Network Access Control has already been praised and offered for many years by various manufacturers - but most of the projects have unfortunately come to nothing or even failed. The technologies were just not mature or the approaches were incorrectly selected.
With the product macmon we want to show that it is definitely possible to ensure the security of network accesses and that it is also easy to implement. The requirement to cope with a variety of networks itself has a big role to play! Our objective is to ensure the support and security without time consuming changes in the respective environment.
As we understand it, Network Access Control should be a matter of course in the future just like virus protection and firewall products. Since the attacks, intrusion attempts and espionage activities are happening more frequently and becoming more ingenious, hence we want to contribute our part in providing a basic protection.
Christian Bücker, CEO
Born in 1981 in Münster, he began his professional career in a management position in the hotel sector. In 2006 he shifted to the IT sector and worked for R. Bücker EDV Beratung Datentechnik GmbH, an independent IT security specialist who has been successful in the market for more than 25 years, where he acquired the relevant industrial experience initially as an assistant to the management and then as an authorized officer.
Today, he combines his IT security know-how while provide consultation on NAC solutions and strategies, on encryption and data security concepts and has been the managing partner of macmon secure gmbh since 2012.
Being successful means combining know-how.
Since its inception, macmon secure has had a motivated team with high standards set for their own performance.
In the field of IT security that is changing very rapidly, it is a challenge to be constantly aware of the latest developments and changes and to be "always at it" on one's own initiative. We deal with this challenge in the team by exchanging information and specializations that complement each other optimally.
Our team that now consists of more than 30 members includes diploma engineers and business managers, software engineers, bachelor and master of science degree holders in applied information technology, diploma and qualified IT specialists, who together contribute in further developing our macmon NAC software in a market-oriented manner, in successfully implementing the NAC projects at our customer locations and hence contribute to our success.
The threat of cybercrime in Germany grows continuously. That is the conclusion to which the German Federal Office of Criminal Investigation arrives presenting an overview of the situation Cybercrime 2011 in September 2011. According to that overview damages in comparison to year 2010 rose by 16 % to 71.2 million EUR. The dark figure is high. According to the inter-trade organization BITKOM, German medium-sized businesses are increasingly in focus of attackers. Especially small and medium-sized businesses (SMB) have not yet given adequate consideration to the increasing threat situation. Thereby, the trend towards the commercial use of smartphones, tablets und netbooks plays an important role. According to a survey by BITKOM almost 43 % of ICT-businesses allow their employees the use of private smartphones, netbooks, or tablet computers. In contrast, almost half (42 %) of the businesses do not consider mobile end devises in their IT safety concepts at all.
Security systems, such as firewalls, virus scanners, spam filters, VPN gateways are indeed used by SMB but work typically isolated of each other. However, many attacks can only be identified by combining data of different systems. Even if an attack has been identified, the counteractions are often carried out too late and the attacker has already disrupted the operation of important systems or has attained sensitive information. Continuative and proactive monitoring of IT systems (clients, servers, components of networks, firewall etc.) as well as of processes and events in the network does usually not take place.
Large businesses and enterprises use so called "Security Information and Event Management" (SIEM) components for this surveillance. There, SIEM systems are meanwhile seen as an important component of company networks and IT infrastructure. SIEM systems allow to consolidate and to evaluate messages and alerts of individual components of an IT system. At the same time messages of specialized security systems (firewall-logs, VPN gateways etc.) can be taken into account. However, practice showed that these SIEM systems are extremely complex and only operable with large personnel effort. Many times SIEM systems are installed but neglected in continuing operation.
SIEM systems are typically not suitable for the use in the SMB environment, mainly because of the following reasons:
- High costs for installation and maintenance because new components (collectors) of IT infrastructure have to be installed, configured and maintained.
- High costs for the operation because extensive expert knowledge for the analysis and the right interpretation of messages and output of SIEM systems are needed.
- Deficient scalability to small and medium-sized networks.
Main goal of the SIMU-project is the development of a system, similar to SIEM, which significantly improves IT security in a corporate network without making great effort. In addition to its simple integration into IT infrastructures of SMB and its easy traceability of relevant events and processes in the network, it is to be realized without great effort of configuration, operation and maintenance. On the functional level SIMU works like SIEM systems which means it monitors processes and events within the corporate network and automatically initiates proactive real-time measures to improve security.
The Trusted Computing Group (TCG) has developed an open standard for a metadata model using IF-MAP (Interface to Metadata Access Point) as part of its Trusted Network Connect Working Group (TNC-WG).Throughout the implementation various security systems can be real-time integrated. The IF-MAP service is extremely flexible and can combine standardised as well as user-defined data. In the process, the threat generated especially by mobile terminal devices like smart phones have to be taken into account. ESUKOM focuses on integrating existing security solutions (commercial and open source) based on a common metadata format as defined by the IF-MAP specification of the Trusted Computing Group.
macmon secure GmbH supports this standard and is presently involved with research partners and partners from the IT industry in the joint research project on "real-time security for corporate networks by consolidating metadata - ESUKOM".
The project is funded as part of the commonly defined focus on "IT security" by the BMBF (Federal ministry of Education and Research) and BMI (Federal Ministry of Internal affairs). The project partners are the Fraunhofer SIT in Darmstadt, the University of Applied Sciences and Arts (HsH Hochschule Hannover), NCP and DECOIT from Bremen.