Inpixon IPA Security
0.00

Problems that solves

Unauthorized access to corporate IT systems and data

Risk or Leaks of confidential information

Risk of attacks by hackers

High costs

Values

Reduce Costs

Ensure Security and Business Continuity

Inpixon IPA Security

Inpixon’s IPA Platform creates a Security Dome within your premises by detecting all wireless devices and their movements — phones, smartwatches, computers, printers, IoT devices, beacons and more.

Description

Inpixon gives you complete situational awareness and wireless intrusion detection in a single, real-time security dashboard, enabling you to make key decisions around security, risk mitigation and public safety. Wireless device detection
  • Locate Wi-Fi, Bluetooth and Cellular
  • Detect Rogue Devices
  • Trigger MDM policies
  • Enforce No-Phones Zones
Identify persons-of-interest
  • Identify persons-of-interest (POI)
  • Find and Follow® them across cameras, even off-camera
  • Quickly jump to evidentiary video frames
  • Get alerted when POIs return to your facility
Enforce no-phones zones
  • Geofence areas of interest
  • Trigger MDM/EMM/UEM to automatically enforce security policies based on a device’s location
  • Disable risky features (e.g., recording, transmission, etc.) in no-phones zones
  • Save time with less confiscations and forensics on forgetful employees’ devices
Inpixon’s multi-band, multi-channel, radio frequency (RF) sensors deliver powerful wireless detection capabilities with performance characteristics superior to other systems. While the vast majority of alternative solutions sense only Wi-Fi (around 30-40% of devices) or Bluetooth (less than 10%), Inpixon IPA Sensor 4000, coupled with patented processes and proven algorithms, detect and locate all Wi-Fi, Bluetooth (full Bluetooth, not just BLE), cellular, and active RFID. IPA plots the location of each wireless device onto your building’s floor plan diagrams so you can monitor positions and movements in near real-time, set up automated alerts, address threats, and enforce security policies.

User features

Roles of Interested Employees

Chief Executive Officer

Chief Information Officer

Chief IT Security Officer

IT Security and Risk Management

Organizational Features

IT Security Department in company

Internet access is available for employees