Communications Policy Manager

Define acceptable usage policies for your infrastructure and receive alerts when communications occur outside this policy. This network risk monitoring capability creates insight into who is communicating with critical high-security devices, unmanaged IoT devices, and desktops.

Examples:

  • The Chicago office can access the web application server, but not the database server.
  • IoT devices should only communicate with the IoT manufacturer.
  • Printers can communicate with print servers, the manufacturer, and the servicing company, but nothing else.