This website uses cookies to make the content more user-friendly and effective. By using this website, you agree to the use of cookies. You can find additonal information about the use of cookies and the possibility of objecting to the use of cookies here.

Use #itsa19

6 - 8 October 2020 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Exhibitors & Products it-sa 2019
Zoom product LOGO_Network Security Management

Network Security Management

LOGO_Network Security Management

Network Security Management

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.

Information on data protection can be found here.

Your message has been sent.

You do not have a registration yet? Register now and use all advantages of the Exhibitors and Products Database, the supporting programme and the TicketShop.

An error has occurred.

Auconet BICS is able to centrally monitor, control and secure the network regardless of the manufacturer. Switches and gateways are automatically queried in a heterogeneous IT infrastructure.

All connected endpoints as well as ports and uplink connections are identified and displayed independent of manufacturer and model.

BICS enables security for each network port by reading and analyzing the connected endpoints.

Block unauthorized access

BICS enables network switches to block unwanted LAN access by unauthorized endpoints and controls the security settings of individual devices and ports.

  • BICS secures the LAN to prevent the connection of unknown devices.
  • Checks (in learning mode) the network to determine which MAC addresses are used by each connected device.
  • BICS recognizes the connected endpoints and stores their MAC address in the Auconet BICS database.
  • Detects and stores the connection time and port location for each endpoint.
  • Monitors (Events & Alarms) Endpoint connection events and device movements from port to port on the network: Every successful and unsuccessful connection is saved.

Automatic alarm

  • Detects MAC spoofing: BICS alerts when it suspects duplicate MAC addresses and new MAC addresses accessing multiple ports.
  • Prevents the use of MAC addresses in different locations or against security policies. BICS allows the operator to bind any MAC address or group of MAC addresses to specific locations and ports.

Network Security Management is assigned to following product groups:

You decided to attend the it-sa? Get your tickets at the TicketShop


The selected entry has been placed in your favourites!

If you register you can save your favourites permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your favourites permanently. Use the instant access – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your favourites mobile too! Simply log in and access them at anytime.