Download PDF version Contact company

macmon secure GmbH, globally renowned technology solutions provider for network security, announced developing its Network Access Control (NAC) solution completely in Germany. The Berlin-based in-house development team has now been able to even extend the best-of-breed solution with further significant features in order to solve major future challenges of Corporate IT-Security.

Network access control solution

With macmon NAC, enterprise networks will be even more effectively protected against unauthorised access. Security teams will be significantly relieved of administrative workload. The amount in security tools will be reduced, and the IoT-devices securely operated.

With version 5.15.0, macmon secure GmbH has reached yet another milestone

With version 5.15.0, macmon secure GmbH has reached yet another milestone. In addition to numerous new and improved functions, the overall performance of the engine could be significantly increased, again. Therefore the processing speed of large amounts of data - as they occur in the Domain Name System (DNS), the network device detection and foot-printing - multiplied.

Scalability for growing networks

In the optimised dashboard, administrators now can see more details about unauthorised devices in the network status in more detail. macmon NAC also evaluates the network status. This relieves the IT department from work and makes decisions easier. With new and enhanced filter wizards, macmon NAC now also offers the option of searching in IPv4 and IPv6 ranges. The filters can be even more granular. In addition, RADIUS authentication information has been enhanced in reporting and included in a NAC RADIUS report.

In addition to various improvements and optimisations, which result from the close collaboration with the macmon customers, it is now possible to also implement NAC via SNMP with macmon satellites, enabling decentralised NAC. The synchronisation of the servers has been significantly accelerated, the interaction has been expanded considerably with more stability. The transparency of the processes and the performance of the scalability nodes has been increased. In addition, detailed status messages provide more transparency about the synchronisation as well as the system status of the satellites.

macmon RADIUS server

The relatively new Past Viewer feature has been further optimised to more effectively evaluate the historical data of the network. On one hand, the collected information was supplemented by further details and the search for historical data was made more flexible for the administrator.

For logins to a network device, the macmon RADIUS server can now be used for authentication. To do this, macmon NAC has a separate set of rules that makes access options controllable. The switch port layouts stored in a particular network device can be configured, and also displayed graphically. The overview of complex networks increases enormously.

macmon REST API

With a wider range of functionalities, the macmon REST API now covers almost all areas of macmon NAC

With a much wider range of functionalities, the macmon REST API now covers almost all areas of macmon NAC. Thus, the possibility to set manual links was added and the intelligent access to endpoints was extended. So not only the information about company devices, guest devices, and BYOD devices, but from now on about any other unknown/discovered devices are available. Last but not least, the API also enables guest management and Wake-On-LAN.

Access VLANs configured on the switch ports can now be automatically adopted as terminal standard VLANs. Other VLAN concepts can be implemented flexibly, extending to parallel operation with other VLAN management solutions. By activities and on demand you will be informed by e-mail about the event ID and get with one click directly to the process.

Extended capabilities

To support the widest possible network device diversity, several new methods are included, such as extended capabilities for SonicWall Firewalls, Cisco WLAN Controller 5500 and switches from HP (1910s), Ruckus, Extreme (Rail), Alcatel (Industrial), Enterasys and Moxa.

The management of guests and the creation of vouchers via the macmon guest portal has been expanded and is now much more flexible. Administrators can differentiate between time of usage and usage duration and are in the position to extend voucher lifetime quickly.

FireEye integration extends connectivity

In addition to texting, a SMS can be sent to guests on extension or expiration of their utilisation period. The portal pages can now also be displayed in Spanish and Italian. The site offers an optimised display of details and messages for administrators and guests.

The new integration of FireEye enables the receiving and processing of status information of individual endpoints in the network. This way, endpoints that are classified by FireEye as dangerous or infected, are automatically isolated in macmon NAC, accordingly.

Integration with other security solutions

In macmon NAC, other security products can also be integrated, for example, endpoint security solutions

In macmon NAC, other security products can also be integrated, for example, endpoint security solutions, emergency management and firewall / IPS. The company uses its long-standing technology partnerships with well-known manufacturers of security products such as Barracuda, Certex Tenfold, Contechnet, EgoSecure and NCP to promote the knowledge exchange.

The open macmon REST API also enables direct connection to any asset management system, identity source or infrastructure component. Customers benefit from these far-reaching opportunities and can optimally combine multi-vendor IT systems.

Network security

Christian Bücker, Managing Director macmon secure GmbH, said "Over the past few months, our development team has developed significant capabilities that will allow us to further extend our leading position in the dynamic network security market.

He adds, “Our customers appreciate macmon NAC because we offer a solution that can handle the existing enterprise infrastructure in a highly dynamic, but also an intelligent way. Network security becomes even easier and more efficient through our permanent in-house development capabilities."

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

In case you missed it

Panasonic AI-driven cameras empower an expanding vision of new uses
Panasonic AI-driven cameras empower an expanding vision of new uses

Imagine a world where video cameras are not just watching and reporting for security, but have an even wider positive impact on our lives. Imagine that cameras control street and building lights, as people come and go, that traffic jams are predicted and vehicles are automatically rerouted, and more tills are opened, just before a queue starts to form. Cameras with AI capabilities Cameras in stores can show us how we might look in the latest outfit as we browse. That’s the vision from Panasonic about current and future uses for their cameras that provide artificial intelligence (AI) capabilities at the edge. Panasonic feels that these types of intelligent camera applications are also the basis for automation and introduction of Industry 4.0, in which processes are automated, monitored and controlled by AI-driven systems. 4K network security cameras The company’s i-PRO AI-capable camera line can install and run up to three AI-driven video analytic applications Panasonic’s 4K network security cameras have built-in AI capabilities suitable for this next generation of intelligent applications in business and society. The company’s i-PRO AI-capable camera line can install and run up to three AI-driven video analytic applications. The AI engine is directly embedded into the camera, thus reducing costs and Panasonic’s image quality ensures the accuracy of the analytics outcome. FacePRO facial recognition technology Panasonic began advancing AI technology on the server side with FacePRO, the in-house facial recognition application, which uses AI deep learning capabilities. Moving ahead, they transitioned their knowledge of AI from the server side to the edge, introducing i-PRO security cameras with built-in AI capabilities last summer, alongside their own in-house analytics. Moreover, in line with the Panasonic approach to focus more on collaboration with specialist AI software developers, a partnership with Italian software company, A.I. Tech followed in September, with a range of intelligent applications, partially based on deep learning. Additional collaborations are already in place with more than 10 other developers, across the European Union, working on more future applications. i-PRO AI-capable security cameras Open systems are an important part of Panasonic’s current approach. The company’s i-PRO AI-capable cameras are an open platform and designed for third-party application development, therefore, applications can be built or tailored to the needs of an individual customer. Panasonic use to be a company that developed everything in-house, including all the analytics and applications. “However, now we have turned around our strategy by making our i-PRO security cameras open to integrate applications and analytics from third-party companies,” says Gerard Figols, Head of Security Solutions at Panasonic Business Europe. Flexible and adapting to specific customer needs This new approach allows the company to be more flexible and adaptable to customers’ needs. “At the same time, we can be quicker and much more tailored to the market trend,” said Gerard Figols. He adds, “For example, in the retail space, enabling retailers to enhance the customer experience, in smart cities for traffic monitoring and smart parking, and by event organisers and transport hubs to monitor and ensure safety.” Edge-based analytics offer multiple benefits over server-based systems Edge-based analytics Edge-based analytics offer multiple benefits over server-based systems. On one hand, there are monetary benefits - a cost reduction results from the decreased amount of more powerful hardware required on the server side to process the data, on top of reduction in the infrastructure costs, as not all the full video stream needs to be sent for analysis, we can work solely with the metadata. On the other hand, there are also advantages of flexibility, as well as reliability. Each camera can have its own individual analytic setup and in case of any issue on the communication or server side, the camera can keep running the analysis at the edge, thereby making sure the CCTV system is still fully operational. Most importantly, systems can keep the same high level of accuracy. Explosion of AI camera applications We can compare the explosion of AI camera applications to the way we experienced it for smartphone applications" “We can compare the explosion of AI camera applications to the way we experienced it for smartphone applications,” said Gerard Figols, adding “However, it doesn’t mean the hardware is not important anymore, as I believe it’s more important than ever. Working with poor picture quality or if the hardware is not reliable, and works 24/7, software cannot run or deliver the outcome it has been designed for.” As hardware specialists, Figols believes that Panasonic seeks to focus on what they do best - Building long-lasting, open network cameras, which are capable of capturing the highest quality images that are required for the latest AI applications, while software developers can concentrate on bringing specialist applications to the market. Same as for smartphones, AI applications will proliferate based on market demand and succeed or fail, based on the value that they deliver. Facial recognition, privacy protection and cross line technologies Panasonic has been in the forefront in developing essential AI applications for CCTV, such as facial recognition, privacy protection and cross line. However, with the market developing so rapidly and the potential applications of AI-driven camera systems being so varied and widespread, Panasonic quickly realised that the future of their network cameras was going to be in open systems, which allow specialist developers and their customers to use their sector expertise to develop their own applications for specific vertical market applications, while using i-PRO hardware. Metadata for detection and recognition Regarding privacy, consider that the use of AI in cameras is about generating metadata for the detection and recognition of patterns, rather than identifying individual identities. “However, there are legitimate privacy concerns, but I firmly believe that attitudes will change quickly when people see the incredible benefits that this technology can deliver,” said Gerard Figols, adding “I hope that we will be able to redefine our view of cameras and AI, not just as insurance, but as life advancing and enhancing.” i-PRO AI Privacy Guard One of the AI applications that Panasonic developed was i-PRO AI Privacy Guard Seeking to understand and appreciate privacy concerns, one of the AI applications that Panasonic developed was i-PRO AI Privacy Guard that generates data without capturing individual identities, following European privacy regulations that are among the strictest in the world. Gerard Fogils said, “The combination of artificial intelligence and the latest generation open camera technology will change the world’s perceptions from Big Brother to Big Benefits. New applications will emerge as the existing generation of cameras is updated to the new open and intelligent next generation devices, and the existing role of the security camera will also continue.” Future scope of AI and cameras He adds, “Not just relying on the security cameras for evidence when things have gone wrong, end users will increasingly be able to use AI and the cameras with much higher accuracy to prevent false alarms and in a proactive way to prevent incidents." Gerard Fogils concludes, “That could be monitoring and alerting when health and safety guidelines are being breached or spotting and flagging patterns of suspicious behaviour before incidents occur.”

What is the best lesson you ever learned from an end user?
What is the best lesson you ever learned from an end user?

Serving customer needs is the goal of most commerce in the physical security market. Understanding those needs requires communication and nuance, and there are sometimes surprises along the way. But in every surprising revelation – and in every customer interaction – there is opportunity to learn something valuable that can help to serve the next customer’s needs more effectively. We asked this week’s Expert Panel Roundtable: what was the best lesson you ever learned from a security end user customer?

What is the impact of remote working on security?
What is the impact of remote working on security?

During the coronavirus lockdown, employees worked from home in record numbers. But the growing trend came with a new set of security challenges. We asked this week’s Expert Panel Roundtable: What is the impact of the transition to remote working/home offices on the security market?