Home | Technology | Platform | Comparison of Features
No Doubt We’re the Best at What We Do
Check out the features we cover and decide for yourself!
| Network Airspace Control & Protection | IoT Security / Asset Inventory | Wireless IS | Wireless channel detection services | NAC / 802.1x | ||
|---|---|---|---|---|---|---|
| Aireye | Armis, Axonius, WootCloud,Clarity | Meraki, Cisco, Aruba, Juniper, Fortinet, Watchguard | Outpost24 / PwnieExpress, Bastille, Kismet | Cisco ISE, Aruba Clearpass | ||
| Airspace Visibility, Classification and Monitoring | Rogue AP & Evil Twin | ![]() |
![]() |
|||
| Ad Hoc & Hotspot | ![]() |
|||||
| Other Unauthorized Access (segmentation) | ![]() |
![]() |
||||
| Device Identification | ![]() |
![]() |
![]() |
![]() |
![]() |
|
| Device Classification | ![]() |
![]() |
![]() |
![]() |
||
| Visualize Device Interactions | ![]() |
|||||
| - At Floor Level | ![]() |
|||||
| - At logical level by SSID/Station | ![]() |
|||||
| Vulnerability Detection | ![]() |
![]() |
||||
| Authentication & Identity Management | ![]() |
![]() |
||||
| Layer 3+ Visibility | ![]() |
![]() |
![]() |
|||
| Prevention | Network and Device Hijacking | ![]() |
![]() |
![]() |
||
| Full Layer 2 Firewall | ![]() |
|||||
| - Limit Communication from and to SSIDs | ![]() |
|||||
| - Limit Communication from and to Stations (Devices) | ![]() |
|||||
| - Limit Communication by Security Protocols | ![]() |
|||||
| - Limit Communication by Time Windows | ![]() |
|||||
| Connectivity Misuse | ![]() |
|||||
| Vulnerability Prevention | ![]() |
|||||
| 802.1x / NAC | ![]() |
![]() |
||||
| Forensics | All Airspace data | ![]() |
![]() |
![]() |
||
| OT Data Leakage Prevention | ![]() |
![]() |
||||
| Replay Device Location on Floor | ![]() |
![]() |
||||
| Show Historic Device Interaction | ![]() |

