Network Visibility
Automatically detect, classify, profile and monitor rogue network devices and their security state.
Endpoint Compliance
Endpoint security posture assessment; pre and post connection – 802.1x or non-802.1x.
Guest Management
Automated, sponsored and time-based guest access.
Policy Management
Centralized, granular access policies – wizard editor, adaptive AUTH, RBAC and segmentation.
BYOD/Mobility
Automated onboarding, third party EMM support and Pulse MDM.
Behavioral Analytics
UEBA to detect IoT rogue devices, DGA attacks and MAC spoofing.