This shows detailed screenshots of i7's peregrine7 - an AGENTLESS BYOD security too. Peregrine7 discovers, detailed fingerprints and even checks the security/threat status of the device (compromised, vulnerable, malicious, intrusive etc) and then based on the threat status allow/deny the device connecting to corporate network. We also detect apps on the wire. We support irrespective of how the device enters the corporate network - via Corporate Wi-Fi or via public Wi-Fi or 3G/4G/LTE (VPN). All done 100% agentless and non-intrusive what we call ZERO-TOUCH and our deployment is completely out-of-band and hence we don't introduce any latency and we connect to the SPAM or Mirror port and we call it ZERO-LATENCY. We also detect whether any anti-virus software is installed on the device what we call the posture assessment. Our value proposition is that “We protect your network from malicious/infected BYODs” “We Protect the Enterprise Network” by Detect & Fingerprint1 all personal devices Prevent the malicious devices from connecting 100% Agentless (Zero-touch) Zero-Latency Deployment Provide detailed Compliance Reports “To Know & To Protect” 1 Secure detection & fingerprinting (US patent pending) The Questions we answer are: What devices are getting into the network? Who do they belong to? Are they infected? Are they compromised or malicious? How vulnerable are they? What are they accessing? What apps* are they running? Can I control the access? Can I get Compliance audit reports?