A physical or virtual security solution that dynamically identifies and evaluates network devices and applications when they connect to a network. Because it doesn’t require agents, it works with devices — managed and unmanaged, known and unknown, PC and mobile, embedded and virtual. Determines the user, owner, operating system, device configuration, software, services, patch state and the presence of security agents. Provides remediation, control and continuous monitoring of these devices as they come and go from the network.
* Agentless: No endpoint agents are required for authentication or network access control, allowing it to see and control managed, unmanaged and IoT devices.
* Open interoperability: Works with switches, routers, VPNs, firewalls, endpoint operating systems, patch management systems, antivirus systems, directories and ticketing systems without infrastructure changes or upgrades.
* Security orchestration: Optional modules orchestrate information sharing and policy-based security enforcement between it and IT and security management products.