Greater Security in Just Two Days – Italian Local Government Trusts in German Network Security

The public administration in Trani, Southern Italian seaport, handles highly sensitive personal data on its inhabitants, which is a lucrative target for cyber criminals. It also manages information about critical infrastructures, including data about energy suppliers and the public transport system as well as public tendering and planning documents. Once the choice was made to go with the IT security experts macmon secure, the city was able to introduce the NAC solution in just two days.

With macmon NAC, the IT administrators now know which devices are on their network, at all times, and can efficiently monitor PCs, printers, laptops and technical devices. Macmon NAC detects, reports and prevents the operation of third-party systems in the public authority’s internal network. That ensures that the administrative IT is protected against attacks on sensitive personal data. Macmon NAC displays the whole network in a graphical topology and in real time. In addition to the network itself, it also maps all connections between the network devices in the infrastructure. This valuable overview was available to the Trani IT team shortly after commissioning and enables them to locate incorrect configurations, unknown devices and vulnerabilities, for instance, providing maximum stability and security on the network.


The second central objective of the Commune di Trani is to prevent the use of unauthorized devices. Guest and employee devices (BYOD) can now be simply and securely authorized via the guest portal, using dynamic management of the network segments. The variety of different devices, such as notebooks or tablets from different manufacturers, poses no problem for macmon NAC, even when managing guest devices, because authentication takes place via the macmon RADIUS Server based on the unique MAC address. The Comune di Trani supplements its Network Access Control system with the provision of a guest portal that also enables temporary and restricted access by third-party devices. In the past, the IT department had to manage guest devices. Now, other members of staff can prepare appropriate guest identities via the guest portal and employees can register their own devices themselves, based on specific criteria. Delegating the management of guest and employee devices in this way relieves the burden on the IT department considerably.

You can find the detailed customer story here.