Key Features

  • Locate users and devices on your network
  • Identify users with Active Directory integration
  • Whitelist hosts to detect rogue devices
  • Track sensitive or suspicious devices with a watch list
  • Correlate network topology to endpoints and users
  • Remotely turn switch ports on and off