Coming October 25: PeerSpot Awards will be announced! Learn more
LORENZO PUGNAGHI - PeerSpot reviewer
IT Security at the Emilia Romagna Region at RER
  • 2
  • 205

What is your recommended Network Access Control (NAC) solution for an enterprise?


I'm in a need of a Network Access Control (NAC) solution for my organization. The size of the company is 5000 users.

What Network Access Control (NAC) solution would you recommend me to look at and why?

PeerSpot user
2 Answers
PeerSpot user
Pre-Sales Engineer at macmon secure
23 June 21

Hello Lorenzo,

have you already looked at macmon Network Access Control (NAC)?

It detects, monitors and protects network access in companies and organizations from unauthorized access. Therefore macmon contributes significantly to bring overview and control to complex, heterogeneous networks and to minimize the risk from potential attacks. macmon brings every company a flexible and efficient NAC solution that is quickly implemented with little effort. The substantial added value for macmon users is, in addition to overview and control, automatic switching and assignment based on rules, which saves network administrators effort. Over 1,500 satisfied customers testify to this. macmon NAC provides a complete overview of the entire network environment at all times, performs many necessary configurations automatically and guarantees protection against unauthorized access and network attacks.

Some special values are:

  • Protects the network from unauthorized, non-compliant devices and internal attacks

  • Intelligent AD integration & dynamic rule creation

  • Graphical Visualization of the whole network

  • Interactive, graphical network topology

  • Completely “Made In Germany“

  • German vendor support

Please do not hesitate to contact me, if I can provide further information on this matter

Best Regards


Evgeny Belenky - PeerSpot reviewer
Director of Community at PeerSpot (formerly IT Central Station)
Community Manager
25 May 21

@Unmesh Deshpande , @Sean Muller ​and @Manjil Bhetwal. Could you share your recommendations with @LORENZO PUGNAGHI


Find out what your peers are saying about Cisco, Aruba Networks, ForeScout and others in Network Access Control (NAC). Updated: September 2022.
633,572 professionals have used our research since 2012.
Related Questions
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
Mar 22, 2022
Why do you need it in your company?
See 2 answers
Janet Staver - PeerSpot reviewer
Tech Blogger
20 March 22
NAC is critical for your business in monitoring your devices and users — both authorized and unauthorized — that might be trying to access the network. Having network access control will help you block out cybercriminals, hackers and data thieves. If that’s not enough to convince you, here are some other reasons why NAC is important: It secures user devices: Implementing a NAC solution will strengthen network security by denying network access to non-compliant user devices. With a lot of companies promoting remote work, it is more likely that employees will be logging in using unknown devices. NAC will ensure all their devices can connect securely, without compromising your network. In addition, the remediation and quarantine systems of a NAC provide a stable line of defense to keep non-compliant devices that can compromise your systems off of the network, offering extra protection. Visibility: Cyber attackers focus on user devices and endpoints as vulnerable entry points. WIth a NAC solution in place, you will be able to have a detailed view of all devices connected to your networks, and you will also be able to see the security posture of each device. Having this extra visibility gives you the upper hand in managing potential network security risks, since it provides actionable insights. Automated policy enforcement: A NAC solution is designed to automatically execute NAC policies, since they are built into your network infrastructure. The solution’s automation also reduces administrative overhead. Access controls: A NAC is a good way to embed access control and endpoint security policies into your network infrastructure, which gives you an additional level of protection. Drastically improve network performance: Another reason why NAC is important is because it can improve the performance of your network. It is not uncommon for companies that don’t have a NAC solution to add multiple SSIDs. While adding SSIDs may be a workaround, and can get the job done on a very basic level, having a NAC offers much more granularity. Using an SSID also takes up bandwidth, and every time you give out a different password for a different end-user on your network, you damage the performance. By implementing a NAC solution, you gain back bandwidth used by SSIDs. Safeguard your data and other sensitive information: Having a NAC solution can prevent unauthorized access to company-sensitive data by employees. In this way, an employee that needs to access the corporate intranet won’t get access to sensitive customer data unless their role warrants it and they have been approved for that access. Save money and time: Typically, most organizations try to tackle network security in pieces, by using a firewall and/or an antivirus solution in addition. However, the use of completely separate systems for managing access permissions can create mass disorganization and a lot of administration overhead. Implementing a NAC solution can benefit your company, saving you the money you would be spending on multiple solutions that can be accomplished by just using one, and it will save you time as well.
John Johny Restrepo Hernández - PeerSpot reviewer
Solutions Architect at Controles Empresariales
22 March 22
NAC it's particularly important for access to resources in your organization. Example: If the device is enrolled and compliant with your MDM solution, e.g. Microsoft Intune, the NAC solution should allow the device access to corporate resources. Users can be allowed or denied access when trying to access corporate Wi-Fi or VPN resources. Feature behaviors: Devices that are actively synchronizing to Intune can't move from Compliant / Noncompliant to Not Synced (or Unknown). The Unknown state is reserved for newly enrolled devices that haven't been evaluated for compliance yet. For devices that are blocked from access to resources, the blocking service should redirect all users to the management portal to determine why the device is blocked. If the users visit this page, their devices are synchronously reevaluated for compliance. NAC and Conditional Access: NAC works with Conditional Access to provide access control decisions. For all the mentioned before, NAC is very essential.
User at ODS
Jan 06, 2022
Has anyone ever heard of  The service they are offering appears to tick all the boxes that I'm after. Do any other companies do something remotely similar or the same thing? I'm going to list a few things that I'm after... I need a service that shields the connection between my employees and the web applications that we use. permission management for individual web appl...
See 1 answer
Senior Security Architect for Medical Devices at a pharma/biotech company with 10,001+ employees
06 January 22
You may want to look at CloudFlare as well.
Download Free Report
Download our free Network Access Control (NAC) Report and find out what your peers are saying about Cisco, Aruba Networks, ForeScout, and more! Updated: September 2022.
633,572 professionals have used our research since 2012.