• (+95) 151 4134
  • |

discovers and classifies devices without requiring agents. Based on its classification, CounterACT then assesses the device’s security posture and applies policies that enforce the specific behavior the device is allowed to have while connected to a network. See more. Control more.

more details
Extended Modules

extend the capabilities of CounterACT to a vast range of system infrastructure and third-party security management tools.

more details
Enterprise Manager

provides centralized management and control of distributed virtual and physical CounterACT appliances.

more details

Copyright © 2021 All Rights Reserved By YITM Co., Ltd. Powered By  Innovix Solutions