Macmon NAC Smart
0.00

Problems that solves

Unauthorized access to corporate IT systems and data

Risk or Leaks of confidential information

Risk of attacks by hackers

Risk of data loss or damage

Risk of lost access to data and IT systems

High costs

Values

Reduce Costs

Ensure Security and Business Continuity

Macmon NAC Smart

Macmon NAC Smart - network access control for small and medium-sized businesses.

Description

Until recently, the cost-benefit ratio for purchasing and implementing a Network Access Control (NAC) solution was too high for small and medium-sized businesses. But IT risks are rising in SMBs as well; it’s just that they lack the time, budget and personnel. Macmon NAC smart provides oversight, control and security for your network and is specially designed for small and medium-sized businesses. In addition to offering comprehensive network transparency, guest and BYOD management and differentiated policy enforcement, the BSI (German Federal Office for Information Security) certified solution can be up and running quickly and in just a few hours without changes to your infrastructure. Your benefits with Macmon NAC Smart:
  • 3 years of network access control in an all-inclusive package
  • The full range of features of the macmon Premium Bundle
  • Up to 150 or 250 nodes (extension possible)
  • Completely set up and ready for operation in max. 4 hours via a remote session
  • Choice of a high-quality appliance or a virtual version
  • 3-year NBD warranty on the appliance
With Macmon NAC Smart:
  • All network access points are protected against unauthorized access.
  • Unauthorized access to and from IoT devices is prevented.
  • Guests are given appropriate access to resources via a guest portal.
  • Suspicious changes in the network trigger alarms or other responses.
  • Employees can use their private devices easily and in a controlled manner.
  • Attackers and foreign devices are not allowed access.
  • Infected devices are automatically disconnected from the network.
  • External employees receive controlled access to selected resources.
  • Administrators see a graphical overview of the network – in real-time.
  • All devices can be found and located in the network.
  • Endpoints connected to VoIP telephones are precisely controlled.
  • IoT devices are detected and smartly operated by the rest of the IT infrastructure.
  • Port configuration and network documentation are performed automatically.
  • Employees who move automatically receive the same access to their usual resources.

User features

Roles of Interested Employees

Chief Executive Officer

Chief Information Officer

Chief IT Security Officer

IT Security and Risk Management

Organizational Features

IT Security Department in company