
Dana Yanch
Articles
-
Juniper Mist Virtual Edge Deployment Guide
This article walks through the steps to onboard, configure, and manage Juniper Mist integration with the Elisity Platform. This integration requires Cloud Control Center 15.6 or later. NOTE: ...
-
Armis Classification Details
This article summarizes which device attributes can be enriched from our connector with Armis, and the benefits of using that enriched data in policy. Our integration with Armis is intended to allo...
-
Connect Armis
Elisity supports simple API connectivity to Armis as a method to enrich IT, IoT, OT and IoMT device discovery and identity. This enables asset data from Armis to be imported into IdentityGraph for ...
-
Onboarding Arista Switches as a Virtual Edge Node
This article summarizes how to onboard your Arista access layer switches as Virtual Edge Nodes for policy enforcement. This can only be done after deploying a Virtual Edge. NOTE: As of Cloud Contr...
-
Role Based Access Control (RBAC)
Overview Cloud Control Center's Role-Based Access Control (RBAC) feature empowers administrators to define custom roles with specific privileges and assign these roles to users, either created loca...
-
CrowdStrike Classification Details
This article summarizes which device attributes can be enriched from our connector with CrowdStrike, and the benefits of using that enriched data in policy. Our integration with CrowdStrike is inte...
-
Connect CrowdStrike
Elisity supports simple API connectivity to CrowdStrike as a method to enrich device discovery and identity. This allows data from CrowdStrike to be pulled into IdentityGraph for use as Core Effect...
-
Palo Alto Networks IoT Security Classification Details
This article summarizes which device attributes can be enriched from our connector with Palo Alto Networks IoT Security, and the benefits of using that enriched data in policy. Our integration with...
-
Connect Palo Alto Networks IoT Security
Elisity supports simple API connectivity to Palo Alto Networks IoT Security as a method to enrich IT, IoT, IoMT and OT device discovery and identity. This allows data from Palo Alto Networks IoT Se...
-
Leveraging Trust Attributes for Policy Group Definition
Cloud Control Center can validate a device’s existence in a particular Identity integration before trusting it and assigning it to a policy group, adding an additional layer of security verificatio...