Protecting Networks One Device At a Time

Context driven access control to support a remote workforce

hero-graphic-100120

Mobile phones

1 of 13

Wall plugs

2 of 13

Light bulbs

3 of 13

Coffee makers

4 of 13

Security cameras

5 of 13

Smart watches

6 of 13

Interactive whiteboards

7 of 13

Printers

8 of 13

Batteries

9 of 13

Smart thermostats

10 of 13

Refrigerators

11 of 13

Door locks

12 of 13

Smart speakers

13 of 13

Device Fingerprinting Needs WootCloud TrueID™ Blog Device Fingerprinting Needs WootCloud TrueID™ Read Now Micro-Segmentation & Software Defined Access Control Blog Micro-Segmentation & Software Defined Access Control Read Now Supercharge your SIEM, SOAR investments Solution Brief Supercharge your SIEM, SOAR investments Download Now WootCloud ROI Estimator Tools WootCloud ROI Estimator Launch Now WootCloud Detected Thousands of Exposed Cisco Routers Administrative Web Consoles Research Report WootCloud Detected Thousands of Exposed Cisco Routers Administrative Web Consoles Read Report Bad guys are using automation to attack your networks. Why Not Use the Same Techniques To Defend Yourself? Blog Bad guys are using automation to attack your networks. Why Not Use the Same Techniques To Defend Yourself? Read Now

Making The Difference

WootCloud in Enterprise Network Security

Beyond
Visibility

Interface correlation
and robust asset management

Actionable Alert
Intelligence

Rich diagnostics & deep investigation capability to automate alert handling at scale

Dynamic Access
Control

Control device and user access based on posture, context and real time threat assessment

Granular
Micro-segmentation

Automatically isolate workloads,
devices and users

Segmentation policies using HyperContext® data to better isolate security flaws

 

Optimize Security Resource Allocation

Identify areas to improve risk posture

wootcloud-flow

Supercharge SIEM Investments

Append HyperContext® insights to SIEM data and feed into orchestration workflows

Actionable Insights to Improve Risk Posture

Device risk scores to identify SecOps, Network Ops, & IT Ops gaps

The device centric model generates highly contextual tags that offers a huge advantage to automate, control and handle devices on a large scale. This serves to close a glaring gap in NAC which fails to adequately secure managed and unmanaged devices because of the tight coupling between L2/L3 addressing, user-based authentication and security.

This offers threat detection relevant to each device for eg: an audio-conferencing equipment has a completely different risk and threat assessment profile compared to a Smart TV, or a DHCP server. Read how we detected vulnerable Polycom devices and an undetected OMNI bot infection on them.

This offers device visibility beyond IP, MAC and Ethernet network borders which helps IT handle devices at scale and segregate them effectively. It is tailored to immediately solve audit requirements for visibility and organizational control measurements in real time.

Unsanctioned devices from remote workers will soon inundate your corporate networks, and in the rush to enable increased remote access capacity, simple configuration errors will introduce many security challenges for your organization.

Our offer gives you a fully functional virtual machine of WootCloud Enterprise with the following capabilities:

Device Discovery: Agentless, non-intrusive solution that discovers managed and unmanaged devices on the network. It also monitors peer-to-peer in-air communications over WIFI, Bluetooth, and Bluetooth Low Energy.

Granular Device Context: Collects device information from physical, logical, operational and locational touchpoints and identifies the different interfaces as being from the same device. Also, performs deep packet analysis to provide a fine-grained analysis of every device in the organization.

True Identity™: Accurately identifies and fingerprints all new devices seen in the organization automatically, recognizes anomalous behavior at the device level, and offers insights and analytics about device-level risks and threats. View best practices around mitigating threat profiles.

Micro-Segmentation: Implemented at the software layer, decoupled from the network hardware and NAC tools, and, when coupled with deep device context, delivers device-level granular segmentation that is easy to deploy and operate automatically at IoT scale.

Risk Assessment: Provides unique risk profile for each device, calculated by our proprietary algorithm to identify SecOps, Network Ops, & IT Ops gaps to improve device risk posture.

Large scale automation via a robust policy engine: A powerful policy engine automates and enforces control points which automates handling large numbers of different devices and maintaining hygiene in the organization. Trigger policies at machine speeds and at IoT scale.Our 

Throughput400 Mbps1 Gbps2 Gbps5 Gbps
Virtual Machine Guest Specifications 2 virtual CPU cores
8 GB RAM
100 GB disk space
4 virtual CPU cores
8 GB RAM
150 GB disk space
8 virtual CPU cores
16 GB RAM
150 GB disk space
16 virtual CPU cores
64 GB RAM
600 GB disk space
RequirementsVMware ESXi 5.0 or later
Intel or AMD CPUs supporting SSE3 and SSE4
Two network interfaces

Request a Shadow Device Risk Assessment

Recent FBI Warnings on Device Security

FBI recommends that you keep your IoT devices on a separate network Is your smart TV spying on you? A new FBI warning says it’s possible Securing the Internet of Things

This website uses cookies to ensure you get the best experience on our website.