In our new macmon Video you will get the most important information about Network Access Control!
macmon Network Access Control
macmon VLAN Management
macmon Guest Service
The Institute of Electrical and Electronics Engineers (IEEE) is a global association that has committees for standardising technology, hardware and software. The standard 802.1X has already been revised and revamped several times and represents a well-developed recommendation for the secure authentication of devices in networks. macmon supports this standard and aids its introduction and operation.
As a customer-focused developer of IT security technologies, we have seen the need to be able to respond quickly to critical situations, in many customer environments. Conficker and other Malware attacks have shown that in general, manual actions are often too late. Through centralized control of network accesses and its open architecture, macmon is in a powerful position to provide automated support.
Thanks to its functions and automated systems, macmon NAC provides enormous potential for administrative savings. A simple checklist makes different savings opportunities for customers immediately transparent, including the administrative effort to be saved in man-days and the resulting financial advantage.
In addition to the Network Access Control, detailed monitoring of the authorized systems with respect to compliance with the security guidelines is increasingly important. In many situations, small “security breaches“ are adequate to provide easily accessible points of attack. Permanent monitoring of the “compliance status“ and automated enforcement of guidelines is therefore indispensable. As a specialist for Network Access Control, macmon secure is aware of this requirement. With macmon compliance, macmon is the first manufacturer to offer the option to use multiple, connectable components in order to effectively enforce the company guidelines.
Today, nearly everyone has at least one mobile device and expects to be able to access the Internet wherever and whenever they are, but it remains to be seen whether this is a blessing or a curse. However, mobile workers, service providers, suppliers and customers often require detailed access to certain resources in your company‘s network, which means that neither UMTS & LTE nor a completely separate guest network provide a sufficient solution.
Thanks to its functions and automated systems, macmon NAC provides enormous potential for administrative savings. A simple checklist makes different savings opportunities for customers immediately transparent, including the administrative effort to be saved in man-days and the resulting financial advantage. You can calculate yourself! Simply enter with your macmon consultant, simply enter your savings potential in minutes per month – based on your current network scenario – and calculate your personal savings potential per year.
Our custom-developed NAC solution delivers not only the best answer on how to prevent unsafe network access, but also allows you to integrate NAC with other security products, for example: for example Endpoint Security solutions, Emergency Management and Firewall/IPS. We use our long-term partnerships with renowned manufacturers of security products like CONTECHNET, EgoSecure, ExtraHop, F-Secure, Infoblox, MobileIron, NCP and tenfold, to realise seamless 3rd party integrations. Your complex IT-security and management requirements will be fulfilled in the best way possible by implementing the following comprehensive solutions. Make sure, that your company is secured to the highest level possible through deep integration of market leading solutions.
Infrastructures even in “smaller“ companies, are becoming increasingly complex and unmanageable. Redundant connections, branched connections, widely distributed WLAN access points and highly available core networks inevitably lead to fewer and fewer IT employees being able to memorise the current network plan – the topology. If, as is the case in most networks, the entire network is split into virtual networks and you want to carry out fault analysis there, this not only becomes complex, but it can also lead to serious errors when it comes to decision-making.
VLANs (Virtual Local Area Networks) provide the option of segmenting the network regardless of the physical structure. Segmenting a network reduces the broadcast load in the individual segments and also supports security concepts by separating the different areas from each other.
Usually abbreviated as GDPR, this regulation replaces the more than 20-year-old legal frame-work for data protection. Until now, that framework consisted of the European Data Protection Directive from 1995 and the national data protection laws based on it, such as the Data Protection Act 1998 (UK). The GDPR regulates the type of data that must be protected and how this data is handled. It also prescribes specific control mechanisms and sanctions
Companies worldwide ranging from SME to Enterprise, across multiple sectors are already benefiting from the macmon NAC solution. Read our selection of case studies below to learn how you could protect your company’s network against attacks using macmon NAC.
We will be pleased to provide a reference contact in your sector and close to your location.
Just talk to us: +49 30 2325777-0
Latest white papers & guidelines:
- White paper: Network Access Control - A management summary
- White paper: ExtraHop macmon coupling
- White paper: "Bring Your Own Device"- Handling of devices, that customers and colleagues might bring in to your firm
Do you want to download white papers, manuals and technical information about our products? If so, register for our macmon service portal and the KnowledgeBase for macmon customers.