asset thumbnail
White Paper

User-ID Tech Brief

Overview of our User-ID technology that can gather user identity from multiple sources including VPNs, WLAN controllers, captive portals, directory servers, proxies and more. 

Stay two steps ahead of threats

As a member we will keep you informed. Get exclusive invites to events, Unit 42 threat alerts, and the latest cybersecurity tips.