macmon secure develops network security software, focusing on Network Access Control.
Founded in 2003 macmon secure has grown from strength to strength, becoming the technology leader in the field of Network Access Control. In 2014 due to ripening market conditions, macmon expanded its presence into the European Market, opening up an office in the UK. Interest and demand has been strong with growth of more than 25% year on year.
macmon has a broad diverse range of customers varying throughout all industries, capturing SMB’s, medium-sized enterprises through to large international corporations.
Their aspiration: Offering every company a flexible and efficient NAC solution. Which can be implemented with minimal effort, adding considerable surplus value for network security.
macmon secure is a member of the Trusted Computing Group and actively involved in related research projects.
macmon Network Access Control provides you with a complete overview of your entire network environment at all times, performs a large number of essential network configurations automatically and thereby guarantees that all of the devices in your network are protected against unauthorised access and network attacks.
macmon offer their product in two distinct bundles – macmon Network Bundle and the Premium Bundle.
macmon Network Bundle
macmon Network Access Control – macmon Network Access Control provides you with the protection you need to effectively manage network access and protect your network against intrusion of unauthorised devices. get an overview of all the devices on your network and take advantage of mamcon‘s real-time IT inventory management system.
macmon Advanced Security – To effectively defend against external attacks you need (in addition to macmon NAC), protection offered by macmon’s Advanced Security. Building on macmon NAC, a wide range of intelligently combined technologies have been used in this module, which offer you effective protection against all kinds of attacks.
IEEE 802.1X “Out of the Box“ – The Institute of Electrical and Electronics Engineers (IEEE) is a global association that has committees for standardising technology, hardware and software. The standard 802.1X has already been revised and revamped several times and represents a well-developed recommendation for the secure authentication of devices in networks. macmon supports this standard and aids its introduction and operation.
VLAN Manager – With the macmon VLAN Manager, you can take full advantage of the benefits of network segmentation from one centralised point, with very little effort. The system has the potential to reduce your administrative work in a variety of ways:
Guest Service – These days, nearly everyone owns at least one mobile device and expects to be able to access the Internet wherever they are. However, mobile workers, service providers, suppliers and customers often require more specific access to certain resources in your company’s network, which means that neither UMTS and LTE nor a completely separate guest network provide an adequate solution.
Graphical Topology – Infrastructures, even in “smaller” companies, are becoming increasingly complex and unmanageable. macmon’s Graphical Topology provides you with a graphical representation of your network, allowing you to see at all times which devices are connected. If, as is the case in most networks, the network as a whole is split into virtual networks and error analyses are to be conducted there, this not only becomes complex, but it can also lead to serious errors when it comes to decision-making. This is exactly where macmon helps.
The second bundle macmon provide is the Premium Bundle. This includes everything from within the Network bundle but also automated enforcement of the central company and IT security guidelines.
In addition to the network access control, detailed monitoring of the authorised systems with respect to compliance with the security guidelines is increasingly important. In many situations, “small security breaches” are adequate to provide easily accessible points of attack. Permanent monitoring of the “compliance status” and automated enforcement of guidelines is thus indispensable.GO BACK