Transparency in your network through tracking
The tracking of port access with the precise assignment of clients (for example IP phones, printers, PCs or hosts) including the access history enables a comprehensive overview. This is the ideal basis for optimal use of corporate resources, demand planning and departmental billing, etc. In addition, all rights of the users are safeguarded.
Network Access Control: The doorman of your network
Unauthorized access, intrusion of third-party hardware, unauthorized moves and attacks on the network (e.g. MAC flooding etc.) are reliably prevented. Guest and service accesses can be set up conveniently and time-dependently. DICOS PAM reacts immediately by evaluating events such as link-up traps and MAC notifications. In this way, company networks of any size and complexity are securely protected.
The complete overview - even in the WIFI
DICOS PAM in combination with PAM FOR WLAN TRACKING guarantees a view of all devices that are present in the entire network. So, you monitor not only devices connected to switch ports, but also mobile devices logged into the WIFI, such as laptops, mobile devices and tablets. You can even distinguish between internal and external users.