Sitemap
Every page on the engineering-reference site, grouped by section.
Faster than the dropdown nav if you know what you're after. Same structure as the dropdown menus above.
Start here
- HomeEngineering-reference landing page.
- Start a pilot30-day no-fee scoped pilot.
How it works
- How it worksData flow from switch to SIEM.
- Technology (Device DNA)Patented Layer 1 fingerprint mechanism.
- Device validationSpoof-resistance: how identity is verified.
- DetectionDrift events, USB-threat agent, MITRE mapping.
- AI threatsAdversarial-evasion exposure and ML-side risks.
Make the case
- Use casesEngineering-centric scenarios.
- Case studiesFive anonymized outcomes.
- CompareForescout, Armis, Asimily, Claroty, Nozomi.
- ChallengesOperational failure modes and trade-offs.
- FAQEngineer-level questions about the platform.
- Evaluation checklistProcurement-grade, print-friendly.
For your team
- Product tourAnnotated walkthrough of the platform.
- Quick winsFirst-90-days milestone diagram.
- On-call playbook90-second decision trees per event type.
- Syslog & API referenceRFC 5424 syslog, REST endpoints, curl examples.
- IntegrationsSIEM ingest flow, supported tooling.
Company
- AboutWho builds, supply-chain posture, what we don't pretend to be.
- ProductsRoomIQ and SpacesIQ, with deployment shape.
- Threat modelTrust boundaries and operational failure modes.
- Threat intelCurated reference database; what we share.
- GlossaryEngineering terms used across the site.
- ResourcesDownloadable references and one-pagers.
Utility
- SitemapThis page.
- Vulnerability disclosureResponsible-disclosure policy.
- PrivacyWhat we collect and what we don't.
- AccessibilityStandards we hold the site to.
- CookiesWhat this site sets and why.
- TermsSite terms of use.
