We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Compliance checks are a good feature. Compliance check is for windows updates and for antivirus updates, etc."
"The most valuable features are the ease of deployment and ease of use."
"Provides containment and security and and carries out file analysis for cyber theft."
"This solution is very easy to implement and use. The interface is user-friendly."
"The most valuable features of the solution are the user-friendliness, the graphical interface, and the technical support. The interface is very nice and the customization is good."
"Fortinet FortiNAC is both scalable and stable."
"The most valuable features are usability and security."
"The API is a great way to get information from other tools."
"Admin UI could be better matched and easier to use; it cannot work as a RADIUS server."
"The reporting capability needs to be improved."
"This solution could be more agile."
"For our organization and our clients, the price is the main concern. They should work to make it more competitive."
"The response and resolution time for technical support issues need to be improved."
"The implementation process needs improvement. Right now, it's somewhat complicated. They could create some templates to facilitate implementation. Right now everything is done manually, and it just takes a really long time at the initial setup."
"The GUI is a little bit strange — different than other Fortinet products."
"The service macmon offers is already great."
"The licensing fees are a little bit high."
"The pricing is similar to that of other solutions."
The proliferation of Internet of Things (IoT) devices, has made it necessary for organizations to improve their visibility into what is attached to their networks. They need to know every device and every user accessing their networks. IoT devices enable digital transformation initiatives and improve efficiency, flexibility, and optimization. However, they are inherently untrustworthy, with designs that prioritize low-cost over security. FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses.
With macmon Network Access Control you always know which devices are connected to your network and where. It provides profound protection for your corporate network and is a centralized security authority that protects your network against intrusion from unauthorized devices, and ensures the complete overview of all your devices.
UFOs (unknown frightening objects) are a thing of the past, as all your devices such as PCs, printers, laptops, medical and technical devices are identified at any time, efficiently monitored and protected against unauthorized access. Guest and employee devices (BYOD) can be easily and securely authorized via the macmon guest service using dynamic management of network segmentation.
To protect your network against unauthorized access, macmon provides two efficient product bundles as well as additional Add-Ons.
Fortinet FortiNAC is ranked 4th in Network Access Control (NAC) with 7 reviews while macmon Network Access Control is ranked 7th in Network Access Control (NAC) with 1 review. Fortinet FortiNAC is rated 8.4, while macmon Network Access Control is rated 10.0. The top reviewer of Fortinet FortiNAC writes "Enhances the Security Fabric with visibility, control, and automated response for everything that connects to the network & protection against IoT threats extending control to third-party devices". On the other hand, the top reviewer of macmon Network Access Control writes "Communicates well with third-party products, offers good security, and has helpful technical support". Fortinet FortiNAC is most compared with Cisco ISE (Identity Services Engine), Aruba ClearPass, Forescout Platform, Portnox CORE and Genian NAC, whereas macmon Network Access Control is most compared with Aruba ClearPass, Cisco ISE (Identity Services Engine) and Forescout Platform.
See our list of best Network Access Control (NAC) vendors.
We monitor all Network Access Control (NAC) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.