![]() At that time, there was no real documentation. It always took a long time to get answers. There was an old-fashioned look to the product as well and the support was poor. We switched because the solution did not fit the standard of a network access solution. ![]() We used a different solution called Arp Guard. Which solution did I use previously and why did I switch? If you need help they are with you in a short amount of time. You can use macmon in small environments but you can also use it as an enterprise company with locations all over the world. What do I think about the scalability of the solution? You can get support from macmon or macmon partners if you run into issues. The new versions are stable and the macmon team always working on performance improvements. What do I think about the stability of the solution? I've used the solution for several years - likely around 5 or 6. That way, everyone who works from outside the company can be authorized by several authentication factors.Ħ11,060 professionals have used our research since 2012. Network access control combined with Zero Trust for remote workers will be great. At the moment, macmon offers a new solution, called SPD, which refers to Zero Trust. They started with network access and combined it with compliance. ![]() If the feature is something the world needs, they will try to do it. The support is really good, and, if you need some new features, you can always discuss this with the development team. The service macmon offers is already great. The API is a great way to get information from other tools. There is communication between macmon and your firewall, as well as with other security solutions. macmon is able to communicate with a great variety of third-party products. It depends on the personal security level you want to implement. You can use Mac authentification, you can use 802.ix, or stick the Mac address into a special type of operating system. You can also decide where you want which type of authentification. With Macon you are not forced to change your switch infrastructure, macmon handles a variety of vendors. We can give some parts of administration to office personal, for example, giving out vouchers. We don't have to spend much time with macmon. The reporting is excellent and we are always informed if someone without permission has tried to get into our network. We can be sure that nobody forgets to block the ports once the guests are gone. Automatically, devices are put to the right VLANs, and guests get vouchers for their devices – even if they need LAN-Access. We have constant insight into which components are active in our network. We also now can be sure that the network devices are compliant. The network components are from different vendors and with macmon we did not have to change all the components to get a restrictive network access policy. We now always have good knowledge of who is active in our network. With macmon, we can prevent our network easily from unauthorized access. In different areas in the past, it was always so much work to be sure that there were no unknown components in our network. We can be sure that only authorized devices are part of our network. Macmon helps us to know who is in our network.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |