Key features
Authorization authentication
Network activity reporting
Detection of network-connected devices
Classification of network-connected devices
Automatic isolation and prevention of security incidents
Detection and prevention of network layer attacks
Automatic access privilege assignment
Network activity monitoring