RSA® Conference 2024German Exhibitors Auconet Solutions GmbH
Auconet Solutions GmbH
Booth number: 5469-16
www.auconet.com
About us
Global 1000 companies trust Auconet for real-time Business Infrastructure Control, security, and management, based on its next-generation platform that delivers endpoint discovery and profiling, security management, and data on every device and endpoint across the largest enterprise networks. Auconet was founded in 1998 by Frank Winter and a technology team with deep expertise in IT Security- and Operations-Management. They created a comprehensive solution to meet the real-world need for 100% real-time visibility and security of multi-vendor networks and control of the most diverse infrastructures. Designed for enterprise-grade IT Operations- and Security-Management (ITOM), Auconet BICS is a streamlined multi-tenant, cloud or on-premises platform.Address
Auconet Solutions GmbH
An den Treptowers 1
12435 Berlin
Germany
Phone: +49 30 221829-60
An den Treptowers 1
12435 Berlin
Germany
Phone: +49 30 221829-60
Auconet Inc.
1 Market Street
94105 San Francisco
USA
E-mail: hello@auconet.com
Phone: +1 414 855 1000
Internet: www.auconet.com
1 Market Street
94105 San Francisco
USA
E-mail: hello@auconet.com
Phone: +1 414 855 1000
Internet: www.auconet.com
Contact person:
Frank Winter
Managing Director
E-mail: frank.winter@auconet.com
Phone: +49 172 3857755
Auconet BICS NAC
Auconet BICS NAC - Auconet brings unmatched strength to network security. The starting point: BICS detects every endpoint, a capability which our Global 1000 customers list as a top selection criterion. Moreover, Auconet’s approach to security is real-time and multi-faceted – reasons for which Gartner has recognized Auconet during four consecutive years in its Magic Quadrant for Network Access Control (NAC).
Visit website Auconet BICS ESF
BICS Enterprise Security Foundation (ESF) enables security software vendors to expand their own solutions with 100% discovery and visibility of their customers’ IT networks. This allows providers of security solutions to leverage data on 100% of the devices, ports, and endpoints throughout their customers’ networks. The larger and more heterogeneous the customer’s IT infrastructure, the more critical it becomes to discover and control these assets in real time.