Avatar

Dana Yanch

  • Total activity 104
  • Last activity
  • Member since
  • Following 0 users
  • Followed by 0 users
  • Votes 3
  • Subscriptions 72

Articles

Recent activity by Dana Yanch
  • Connect Claroty xDome

    Elisity supports simple API connectivity to Claroty xDome as a method to enrich IT, IoT, IoMT and OT device discovery and identity. This allows data from Claroty to be pulled into IdentityGraph for...

    • Edited
    • 1 follower
    • 0 comments
    • 0 votes
  • Configure Open Connector

    Elisity supports API connectivity to a custom database as a method to enrich IT, IoT, OT and IoMT device discovery and identity. This enables asset data from the custom database to be imported into...

    • Edited
    • 1 follower
    • 0 comments
    • 0 votes
  • Microsoft Defender Classification Details

    This article summarizes which device attributes can be enriched from our connector with Microsoft Defender, and the benefits of using that enriched data in policy. Our integration with Microsoft De...

    • Edited
    • 1 follower
    • 0 comments
    • 0 votes
  • Connect Medigate

    Elisity supports simple API connectivity to Medigate as a method to enrich IT, IoT, OT and IoMT device discovery and identity. This enables asset data from Medigate to be imported into IdentityGrap...

    • Edited
    • 1 follower
    • 0 comments
    • 0 votes
  • Connect Tenable Security Center

    Elisity supports simple API connectivity to Tenable Security Center as a method to enrich device discovery and identity. Cloud Control Center supports API connectivity to Tenable directly or via an...

    • Edited
    • 1 follower
    • 0 comments
    • 0 votes
  • Device Labels

    Device Labels serve as a powerful and flexible tool to differentiate devices, even when they appear identical or very similar across various environments or sites. These labels are user-definable, ...

    • Edited
    • 1 follower
    • 0 comments
    • 0 votes
  • Tenable Security Center Classification Details

    This article summarizes which device attributes can be enriched from our connector with Tenable Security Center, and the benefits of using that enriched data in policy. Our integration with Tenable...

    • Edited
    • 1 follower
    • 0 comments
    • 0 votes
  • Palo Alto Networks IoT Security Classification Details

    This article summarizes which device attributes can be enriched from our connector with Palo Alto Networks IoT Security, and the benefits of using that enriched data in policy. Our integration with...

    • Edited
    • 1 follower
    • 0 comments
    • 0 votes
  • Nozomi Networks Classification Details

    This article summarizes which device attributes can be enriched from our connector with Nozomi Networks, and the benefits of using that enriched data in policy. Our integration with Nozomi Networks...

    • Edited
    • 1 follower
    • 0 comments
    • 0 votes
  • Become a Partner

    Why Sell Elisity Microsegmentation? We are innovators. We partner with innovators. Only together, we can enable organizations of all sizes and industries to innovate by transforming and simplifying...

    • Edited
    • 1 follower
    • 0 comments
    • 0 votes