Endpoint & IoT Device Discovery
Pulse Profiler Delivers Real-Time Visibility, Insight and Tracking of Endpoint and IoT Devices

Security Starts with Visibility
The rise of BYOD and IoT created an enormous challenge for organizations to manage the expanded threat surface. Many companies are unaware exactly what endpoints and IoT devices are connected to their network, magnifying the risk of breaches because you cannot secure what you cannot see.
Go beyond traditional profiling solutions by identifying and profiling remote devices that access your resources, ensuring no threats go unnoticed.
Recognize a very diverse set of IoT devices with our growing fingerprinting database of over 2 million unique fingerprints and provision them automatically with Pulse Policy Secure regardless of location.
Use MAC address authentication for device validation of unmanageable devices such as networked printers, cash registers, bar code scanners, VoIP handsets, etc.
Leverage a growing database of more than 11,000 unique device types and gather insights using various methods such as DHCP Fingerprinting (Helper Address or RSPAN port), TCP, SMB, MAC OUI, SNMP/SNMP Traps, CDP/LLDP, HTTP User Agent, Nmap, WMI and MDM for full-proof latest standard security.
Competitive Differentiation
- Easy to configure and manage Profiler for visibility into entire network.
- 360-degree visibility by detecting and classifying local and remote devices.
- Detect and classify IoT/IIoT devices and provide end-to-end secure access to manage IoT/IIoT device.
- Monitor and manage devices for profile change.
- Detect Rogue IoT devices and take enforcement action.
- Device Access control using extensive rules-based role mapping and location-based policy framework.
- Device inventory for asset management.
- Easy-to-use filtering capability for better troubleshooting.
-
Overview
-
Key Features
-
Use Cases
-
Technical Specs
-
Benefits
Automatically detect, classify, and monitor all network connected devices

Designed to Seek and Inspect
Robust Real-time Discovery and Inspection Features
- Continuous profiling to discover unmanaged and unknown endpoints and IoT devices.
- Agentless and agent-based discovery and inspection capabilities.
- Multi-factor intelligence gathering: DHCP, SNMP, Nmap, WMI, SSH, EMM, and HTTP session.
- Auto-classification leveraging a growing database of over 10,000 device types.
- Profiles endpoints assigned with static IP addresses and IOT devices without using agents.
- Actively detects and scans open ports to detect MAC spoofing.
Discover the Unknown
Security Starts with Visibility
- Continuous Device Visibility
Discover, examine, and track all known and unknown BYOD, IoT, and user endpoints. Whether on-premise, off-premise, or in the cloud, no device remains hidden when employing Pulse Secure Profiler. Planning a continuous cadence of device discovery supports a proactive security approach to enforcing endpoint security policy and protecting business critical applications from insecure devices.
- IoT Device Discovery
IoT device sprawl can intensify quickly and outgrow IT support capacity. The task of discovering, securing, and managing a vast contingent of IoT devices is simplified through device profiling. Visibility of IoT devices through Pulse Secure Profiler allows IT to control sprawl by tracking each as they connect to the network.
Technical Specifications
- Endpoint visibility into on-premises and remote connection via PCS.
- Fingerprinting Methods: DHCP Fingerprinting (Helper Address or RSPAN port), MAC OUI, SNMP/SNMP Traps, CDP/LLDP, HTTP User Agent, Nmap, WMI and WDM.
- Device Discovery Reporting & Dashboard with advanced filters and historical data.
- Collect endpoint device profiling information and maintain dynamic, contextual inventory of networked devices including IoT devices.
- View local and remote endpoints from single GUI.
- Monitor and manage devices for profile change.
- Supports comprehensive policy enforcement.
- Use device inventory for asset management.
- Useful for troubleshooting and visibility.
Visibility Benefits
Endpoints That are Unknown Cannot Be Secured
An invisible endpoint is insecure and a liability to the protection of the business. Pulse Policy Profiler uncovers unknowns and profiles all endpoints and IoT devices.
- Continuous visibility mapping of all managed and unmanaged network endpoints and IoT devices.
- Ongoing database of over 10,000 unique device types.
- Automatic or custom classification of devices using a variety of polling methods (DHCP, SNMP, Nmap, WMI, SSH, HTTP).
Feature Highlights
Continuous Profiling
Continuous profiling to discover unmanaged and unknown endpoints and IoT devices
Agentless and Agent-based
Agentless and agent-based discovery and inspection capabilities
Intelligence Gathering
Multi-factor intelligence gathering: DHCP, TCP, SMB, SNMP, Nmap, WMI, SSH, MDM, CDP/LLDP and HTTP session
Auto-classification
Auto-classification leveraging a growing database of over 11,000 device types
Profiles Endpoints
Profiles endpoints assigned with static IP addresses and IOT devices without using agents
Minimize Security Risk
Actively detects and scans open ports to minimize security risk
IoT Devices