Aesthetic, automated network topology visualisation enables complete network visibility. Effective and efficient reporting for audits.
Information about the operating system, domain name and device name of an endpoint is collected to distinctly identify the device – this information is being used to detect, repel and locate attacks of all sorts in conjunction with the NAC feature.
Comprehensive overview of all connected known and unknown devices, live asset management, real-time device detection and automated network event response handling.
Authentication using macmon‘s integrated RADIUS server based on MAC address bypass, credentials or certificates. Mixed mode through integration with existing identity stores.
Use macmon's unique and powerful position on the network to enforce endpoint security and compliance through manufacturer integrations. Automated event processing through third-party technologies.
A long history can contribute to forensic analysis of security incidents, but can also provide general information necessary for audits and certifications.
Maximum reliability through flexible high-availability options for local or distributed infrastructures including central management and reporting.
Network management functions such as reading and providing the serial numbers of network devices for import or synchronization with existing CMDBs or asset management systems are possible.