Threat Fend Zero Trust

Threat Fend is your first line of defense against cyber threats targeting distributed workforces & expanding networks.


Gain real-time visibility of endpoints trying to connect to your network, plus additional context such as their location, device type, and requested access layer for authentication. This applies to managed company devices, BYOD and IoT / OT alike, no matter if they're authenticating via wired ports, Wi-Fi or VPN.


Define and enforce unique access control policies based on roles, locations, device types and more across your various network access layers.


Additionally, leverage Threat Fend powerful risk assessment policy configuration capabilities to continually monitor the risk posture of connected devices - including managed and BYOD - enabling your network administrators to understand the true security posture of the network at any point in time.

Remain compliant by quarantining vulnerable, non-compliant devices and return them to a healthy, compliant state automatically by setting unique endpoint remediation policies in accordance with your compliance requirements.


Threat Fend compliance enforcement capabilities can help your organization adhere to industry-specific regulatory and compliance standards such as HIPAA, GLBA, PCI DSS, GDPR, CMMC, NIST and more.

Threat Fend offers the security essentials you want all in one platform offering.



  • One-click cloud RADIUS
  • Anti-flood protection
  • RadSec support & RADIUS forwarding



  • Role-based authentication
  • MAC authentication bypass
  • Certificate authority services



  • 802.1X authentication
  • Dynamic VLAN / ACL assignment
  • Post-connect authorization



  • Monitoring-only mode
  • Archived device data retention
  • Managed, BYOD & IoT profiling



  • Role- & location-based access
  • Policy group assignment per device type
  • Auto-segmentation of users



  • Endpoint risk posture assessment
  • Risk-based access control
  • Firewall, antivirus & app checks



  • Endpoint quarantining
  • Firewall & antivirus updates
  • Compliance enforcement



  • Device visibility & connection timeline
  • Guest access history
  • Security & compliance adherence