Locate users and devices on your network
Identify users with Active Directory integration
Whitelist hosts to detect rogue devices
Track sensitive or suspicious devices with a watch list
Correlate network topology to endpoints and users
Remotely turn switch ports on and off