Endpoint & IoT Device Discovery

Pulse Profiler Delivers Real-Time Visibility, Insight and Tracking of Endpoint and IoT Devices

Banner ProfilerNAC2

Security Starts with Visibility

The rise of BYOD and IoT created an enormous challenge for organizations to manage the expanded threat surface. Many companies are unaware exactly what endpoints and IoT devices are connected to their network, magnifying the risk of breaches because you cannot secure what you cannot see.

 

Track Local and Remote Devices
Column Icon

Go beyond traditional profiling solutions by identifying and profiling remote devices that access your resources, ensuring no threats go unnoticed.

Comprehensive Fingerprinting Database
Column Icon

Recognize a very diverse set of IoT devices with our growing fingerprinting database of over 2 million unique fingerprints and provision them automatically with Pulse Policy Secure regardless of location.

Dynamic Addressing of Unmanageable Endpoint Devices
Column Icon

Use MAC address authentication for device validation of unmanageable devices such as networked printers, cash registers, bar code scanners, VoIP handsets, etc.

Auto-classification and Multi-factor Intelligence Gathering
Column Icon

Leverage a growing database of more than 11,000 unique device types and gather insights using various methods such as DHCP Fingerprinting (Helper Address or RSPAN port), TCP, SMB, MAC OUI, SNMP/SNMP Traps, CDP/LLDP, HTTP User Agent, Nmap, WMI and MDM for full-proof latest standard security.

Competitive Differentiation

  • Easy to configure and manage Profiler for visibility into entire network.
  • 360-degree visibility by detecting and classifying local and remote devices.
  • Detect and classify IoT/IIoT devices and provide end-to-end secure access to manage IoT/IIoT device.
  • Monitor and manage devices for profile change.
  • Detect Rogue IoT devices and take enforcement action.
  • Device Access control using extensive rules-based role mapping and location-based policy framework.
  • Device inventory for asset management.
  • Easy-to-use filtering capability for better troubleshooting.
  • Overview

  • Key Features

  • Use Cases

  • Technical Specs

  • Benefits

Automatically detect, classify, and monitor all network connected devices

Profiler Diagram1

Designed to Seek and Inspect

Robust Real-time Discovery and Inspection Features

  • Continuous profiling to discover unmanaged and unknown endpoints and IoT devices.
  • Agentless and agent-based discovery and inspection capabilities.
  • Multi-factor intelligence gathering: DHCP, SNMP, Nmap, WMI, SSH, EMM, and HTTP session.
  • Auto-classification leveraging a growing database of over 10,000 device types.
  • Profiles endpoints assigned with static IP addresses and IOT devices without using agents.
  • Actively detects and scans open ports to detect MAC spoofing.

Discover the Unknown

Security Starts with Visibility

  • Continuous Device Visibility

Discover, examine, and track all known and unknown BYOD, IoT, and user endpoints. Whether on-premise, off-premise, or in the cloud, no device remains hidden when employing Pulse Secure Profiler. Planning a continuous cadence of device discovery supports a proactive security approach to enforcing endpoint security policy and protecting business critical applications from insecure devices.

  • IoT Device Discovery

IoT device sprawl can intensify quickly and outgrow IT support capacity. The task of discovering, securing, and managing a vast contingent of IoT devices is simplified through device profiling. Visibility of IoT devices through Pulse Secure Profiler allows IT to control sprawl by tracking each as they connect to the network.

Technical Specifications

  • Endpoint visibility into on-premises and remote connection via PCS.
  • Fingerprinting Methods: DHCP Fingerprinting (Helper Address or RSPAN port), MAC OUI, SNMP/SNMP Traps, CDP/LLDP, HTTP User Agent, Nmap, WMI and WDM.
  • Device Discovery Reporting & Dashboard with advanced filters and historical data.
  • Collect endpoint device profiling information and maintain dynamic, contextual inventory of networked devices including IoT devices.
  • View local and remote endpoints from single GUI.
  • Monitor and manage devices for profile change.
  • Supports comprehensive policy enforcement.
  • Use device inventory for asset management.
  • Useful for troubleshooting and visibility.

 

 

Visibility Benefits

Endpoints That are Unknown Cannot Be Secured

An invisible endpoint is insecure and a liability to the protection of the business. Pulse Policy Profiler uncovers unknowns and profiles all endpoints and IoT devices.

  • Continuous visibility mapping of all managed and unmanaged network endpoints and IoT devices.
  • Ongoing database of over 10,000 unique device types.
  • Automatic or custom classification of devices using a variety of polling methods (DHCP, SNMP, Nmap, WMI, SSH, HTTP).

Feature Highlights

Block Icon

Continuous Profiling

Continuous profiling to discover unmanaged and unknown endpoints and IoT devices
Block Icon

Agentless and Agent-based

Agentless and agent-based discovery and inspection capabilities
Block Icon

Intelligence Gathering

Multi-factor intelligence gathering: DHCP, TCP, SMB, SNMP, Nmap, WMI, SSH, MDM, CDP/LLDP and HTTP session
Block Icon

Auto-classification

Auto-classification leveraging a growing database of over 11,000 device types
Block Icon

Profiles Endpoints

Profiles endpoints assigned with static IP addresses and IOT devices without using agents
Block Icon

Minimize Security Risk

Actively detects and scans open ports to minimize security risk
Block Icon

IoT Devices

Detect and take enforcement actions on rogue IoT devices