Allows enterprises to authenticate and authorize users and endpoints via wired, wireless, and VPN with consistent policy throughout the enterprise.Efficiency: Increase IT staff productivity by automating labor-intensive tasks and simplifying service delivery.Ensure patches and AV/AS definitions are up to date.Addresses vulnerabilities on user machines through periodic evaluation and remediation to help proactively mitigate network threats such as viruses, worms, and spyware.Compliance: Create consistent policy across the infrastructure for corporate governance.Mobile Device Security: Dynamically identify and provision the proper policies for tablets, smartphones, GFE, etc.LDAP user with personal iPad gets a different privilege than the same LDAP user with Organization Owned iPad Coordinated Profiling: Allows for profiling data to be tightly integrated in to access policies.Business-relevant policies: Create and enforce consistent policy from the head office to the branch office.Context-aware enforcement: Gathers information from users, devices, infrastructure, and network services to enable organizations to enforce contextual-based business policies across the network.
Inherent benefits include simplified administration, monitoring, and troubleshooting for all these functions.Integrates functions previously delivered in separate, loosely couples applications to deliver higher levels of policy enforcement.Dynamically collects & consolidates endpoint information to make adaptive policy decisions based on ‘context’.Visibility: Single Platform & Pane of Glass - Let IT see who and what is on the network for advanced discovery and troubleshooting.