Awareness of every network infrastructure device on the network is as critical as possessing awareness of every endpoint device and user on the network.  A rogue wireless access point or a switch can easily expose the network to intruders.

Seamless compatibility and integration with a variety of network infrastructure devices is a foundational basis for implementing functionality such as dynamic access control and automated threat response in Network Sentry.