Complete network visibility is the foundation of a strong security posture; it is the base that supports the delivery of alerts and associated contextual information, the compilation of detailed logs, the control of access, and more. Organizations must gain complete network visibility into every device connected to the network in order to have control of granular policies and device actions, as well as automated threat response that can automatically quarantine any suspicious devices.
Awareness of every network infrastructure device is as critical as possessing awareness of every endpoint device and user on the network. A rogue wireless access point or a switch can easily expose the network to intruders.
Seamless compatibility and integration with a variety of network infrastructure devices is a foundational basis for implementing functionality such as dynamic access control and automated threat response in Network Sentry.