A great compliance solution with an edge.
Use Cases and Deployment Scope
We utilize its visibility capabilities to monitor and protect our network from unauthorized devices as it segregates rogue devices and ensures only company-owned assets are connected. Also it makes sure it can recognize what versions of applications are running on what devices at all times and mitigate risks that may come by.
Pros
- Rogue devices detection and segregation.
- Guests registrations.
- Visibility of devices that are connected to our system.
Cons
- They should have more training for the versions of applications they update.
- It would be great if the GUI would be more aesthetic in appearance.
- Nothing else as the application is amazing.
Most Important Features
- Guests registrations.
- Visibility capabilities
- Compliance management.
Return on Investment
- We have been able to achieve deeper levels of security.
- It has been able to counter most threats through the detection of rogue devices and segregating them.
- Fostered accountability as guests' devices is signed in by employees so as to track activities they may be undertaking.
Alternatives Considered
Aruba ClearPass
Other Software Used
Pexels, Avanan, Bitwarden



