Key Features
- Locate users and devices on your network
- Identify users with Active Directory integration
- Whitelist hosts to detect rogue devices
- Track sensitive or suspicious devices with a watch list
- Correlate network topology to endpoints and users
- Remotely turn switch ports on and off