Aesthetic, automated network topology visualisation enables complete network visibility. Effective and efficient reporting for audits.
Operating system information on the endpoint device are being collected, as well as domain name and computer name to distinctly identify the device - this information is being used to detect, repel and locate attacks of all sorts in conjunction with the NAC feature.
Comprehensive overview of all connected known and unknown devices, live asset management, real-time device detection and automated network event response handling.
Authentication using macmon‘s integrated RADIUS server based on MAC address bypass, credentials or certificates. Mixed mode through integration with existing identity stores.
macmon as the authority on the network enforces your compliance policies and allows you to integrate with any other security solution on hand. Security incidents are being dealt with in a fully automated manner.
Isolate dangerous devices
A long history can contribute to forensic analysis of security incidents, but can also provide general information necessary for audits and certifications.
More Details and security
Network management functions such as reading and providing the serial numbers of network devices for import or synchronization with existing CMDBs or asset management systems are possible.