- 
			Informasjon
			
- Complete device visibility with ML-based discovery
 - Prioritize risk with continuous vulnerability assessments
 - Quickly implement policy with automated risk-based recommendations
 - Segment devices and reduce risk with built-in enforcement
 - Ease deployment and operationalization with cloud delivery
 
 - 
			Spesifikasjon
			
 - 
			Nedlastbare filer