Categories
Problems that solves
Unauthorized access to corporate IT systems and data
Risk or Leaks of confidential information
Risk of attacks by hackers
Risk of data loss or damage
Risk of lost access to data and IT systems
High costs
Values
Reduce Costs
Ensure Security and Business Continuity
Macmon NAC Smart
Macmon NAC Smart - network access control for small and medium-sized businesses.
About Product
Description
Until recently, the cost-benefit ratio for purchasing and implementing a Network Access Control (NAC) solution was too high for small and medium-sized businesses. But IT risks are rising in SMBs as well; it’s just that they lack the time, budget and personnel. Macmon NAC smart provides oversight, control and security for your network and is specially designed for small and medium-sized businesses.
In addition to offering comprehensive network transparency, guest and BYOD management and differentiated policy enforcement, the BSI (German Federal Office for Information Security) certified solution can be up and running quickly and in just a few hours without changes to your infrastructure.
Your benefits with Macmon NAC Smart:
- 3 years of network access control in an all-inclusive package
- The full range of features of the macmon Premium Bundle
- Up to 150 or 250 nodes (extension possible)
- Completely set up and ready for operation in max. 4 hours via a remote session
- Choice of a high-quality appliance or a virtual version
- 3-year NBD warranty on the appliance
- All network access points are protected against unauthorized access.
- Unauthorized access to and from IoT devices is prevented.
- Guests are given appropriate access to resources via a guest portal.
- Suspicious changes in the network trigger alarms or other responses.
- Employees can use their private devices easily and in a controlled manner.
- Attackers and foreign devices are not allowed access.
- Infected devices are automatically disconnected from the network.
- External employees receive controlled access to selected resources.
- Administrators see a graphical overview of the network – in real-time.
- All devices can be found and located in the network.
- Endpoints connected to VoIP telephones are precisely controlled.
- IoT devices are detected and smartly operated by the rest of the IT infrastructure.
- Port configuration and network documentation are performed automatically.
- Employees who move automatically receive the same access to their usual resources.
Competitive products
User features
Roles of Interested Employees
Chief Executive Officer
Chief Information Officer
Chief IT Security Officer
IT Security and Risk Management
Organizational Features
IT Security Department in company