Avatar

Dana Yanch

  • Total activity 103
  • Last activity
  • Member since
  • Following 0 users
  • Followed by 0 users
  • Votes 3
  • Subscriptions 71

Articles

Recent activity by Dana Yanch
  • Role Based Access Control (RBAC)

      Overview Cloud Control Center's Role-Based Access Control (RBAC) feature empowers administrators to define custom roles with specific privileges and assign these roles to users, either created lo...

    • Edited
    • 1 follower
    • 0 comments
    • 0 votes
  • Device Labels

    Device Labels serve as a powerful and flexible tool to differentiate devices, even when they appear identical or very similar across various environments or sites. These labels are user-definable, ...

    • Edited
    • 1 follower
    • 0 comments
    • 0 votes
  • Onboarding Catalyst 9800 Wireless Controller

    NOTE: Catalyst 9800 Wireless Controller is only supported with Virtual Edge version 16.1.5+ The minimum support Cisco IOS is 17.9.5 The IP address used for onboarding cannot be assigned to an int...

    • Edited
    • 1 follower
    • 0 comments
    • 0 votes
  • Tenable Security Center Classification Details

    This article summarizes which device attributes can be enriched from our connector with Tenable Security Center, and the benefits of using that enriched data in policy. Our integration with Tenable...

    • Edited
    • 1 follower
    • 0 comments
    • 0 votes
  • Palo Alto Networks IoT Security Classification Details

    This article summarizes which device attributes can be enriched from our connector with Palo Alto Networks IoT Security, and the benefits of using that enriched data in policy. Our integration with...

    • Edited
    • 1 follower
    • 0 comments
    • 0 votes
  • Nozomi Networks Classification Details

    This article summarizes which device attributes can be enriched from our connector with Nozomi Networks, and the benefits of using that enriched data in policy. Our integration with Nozomi Networks...

    • Edited
    • 1 follower
    • 0 comments
    • 0 votes
  • CrowdStrike Classification Details

    This article summarizes which device attributes can be enriched from our connector with CrowdStrike, and the benefits of using that enriched data in policy. Our integration with CrowdStrike is inte...

    • Edited
    • 1 follower
    • 0 comments
    • 0 votes
  • Onboarding Juniper EX4400 as a Virtual Edge Node

    This article summarizes how to onboard your Juniper EX4400 access layer switches as Virtual Edge Nodes for policy enforcement. This can only be done after deploying a Juniper Mist Virtual Edge and ...

    • Edited
    • 1 follower
    • 0 comments
    • 0 votes
  • Juniper Mist Virtual Edge Deployment Guide

    This article walks through the steps to onboard, configure, and manage Juniper Mist integration with the Elisity Platform. This integration requires Cloud Control Center 15.6 or later.      NOTE: ...

    • Edited
    • 1 follower
    • 0 comments
    • 0 votes
  • Become a Partner

    Why Sell Elisity Microsegmentation? We are innovators. We partner with innovators. Only together, we can enable organizations of all sizes and industries to innovate by transforming and simplifying...

    • Edited
    • 1 follower
    • 0 comments
    • 0 votes