Automatically detect, classify, profile and monitor rogue network devices and their security state.
Endpoint security posture assessment; pre and post connection – 802.1x or non-802.1x.
Automated, sponsored and time-based guest access.
Centralized, granular access policies – wizard editor, adaptive AUTH, RBAC and segmentation.
Automated onboarding, third party EMM support and Pulse MDM.
UEBA to detect IoT rogue devices, DGA attacks and MAC spoofing.