Pwn Pulse2018-08-17T20:17:44+00:00

Pwn Pulse

Pwn Pulse discovers, inventories, and classifies all IT and IoT devices, building a comprehensive identity for each device. Device discovery and classification is performed on a continual basis, without the need for agents or network changes.

DISCOVER & INVENTORY ALL DEVICES

Discover all IT and IoT devices — wired, wireless, and Bluetooth — on the network and in the surrounding airspace.

CAPTURE DEVICE SNAPSHOTS

Automatically create comprehensive fingerprints of devices consisting of manufacturer, vendor, ports, services, and associated networks.

ESTABLISH DEVICE IDENTITIES

Correlate interfaces, analyze snapshots, and evaluate device relationships to create individual device identities and track their behavior and changes.

Assess Potential Security Threats

Pwn Pulse continually monitors the behavior of devices and associated systems for indicators of compromise or sabotage, then creates actionable intelligence for threats and risks.

SYSTEM RELATIONSHIPS

Group devices into systems based on relationships, device behavior, and business role.

BEHAVORIAL MONITORING

Continually monitor IoT devices and systems for changes in behavior and configuration.

IOT THREAT INTELLIGENCE

Detect threats and risks and gain the actionable intelligence required to address them.

Respond with Pulse

Respond directly from Pulse to neutralize IoT device threats, or share intelligence with existing security solutions to take actions. Pulse provides the intelligence and directed response options you need to protect your critical systems.

DIRECTED RESPONSE

Select the appropriate response to address identified IoT threats directly from Pulse.

SHAREABLE INTELLIGENCE

Enhance existing security solutions by sharing IoT threat intelligence with the rest of your security stack.

DETAILED DEVICE FORENSICS

Recreate incident conditions with detailed forensics for every device seen.