Frequently
Asked Question
What happens if a device is stolen?
What happens if a device is stolen?
What happens if a device is stolen?
What if someone tries to spoof a device?
What if someone tries to spoof a device?
What if someone tries to spoof a device?
Does KYD still work if the internet is down?
Does KYD still work if the internet is down?
Does KYD still work if the internet is down?
Do I need to install software on my devices?
Do I need to install software on my devices?
Do I need to install software on my devices?
What’s the difference between Core and Dot?
What’s the difference between Core and Dot?
What’s the difference between Core and Dot?
How fast does KYD respond to threats?
How fast does KYD respond to threats?
How fast does KYD respond to threats?
Can KYD block a device before it connects?
Can KYD block a device before it connects?
Can KYD block a device before it connects?
What if power is cut?
What if power is cut?
What if power is cut?
Will KYD slow down my network?
Will KYD slow down my network?
Will KYD slow down my network?
Does KYD replace my firewall or antivirus?
Does KYD replace my firewall or antivirus?
Does KYD replace my firewall or antivirus?
Can KYD protect wireless devices?
Can KYD protect wireless devices?
Can KYD protect wireless devices?
What if someone unplugs Dot and reconnects the device directly?
What if someone unplugs Dot and reconnects the device directly?
What if someone unplugs Dot and reconnects the device directly?
How many devices can Core monitor?
How many devices can Core monitor?
How many devices can Core monitor?
How is Device DNA created?
How is Device DNA created?
How is Device DNA created?
Does KYD detect devices going offline?
Does KYD detect devices going offline?
Does KYD detect devices going offline?
Can KYD integrate with my existing security tools?
Can KYD integrate with my existing security tools?
Can KYD integrate with my existing security tools?
Is KYD compliant with security regulations?
Is KYD compliant with security regulations?
Is KYD compliant with security regulations?
Does KYD work across VLANs and IPv6?
Does KYD work across VLANs and IPv6?
Does KYD work across VLANs and IPv6?
Do I need NAC/802.1X for KYD to be effective?
Do I need NAC/802.1X for KYD to be effective?
Do I need NAC/802.1X for KYD to be effective?
What data leaves my network? Is KYD privacy-safe?
What data leaves my network? Is KYD privacy-safe?
What data leaves my network? Is KYD privacy-safe?
How does KYD handle false positives?
How does KYD handle false positives?
How does KYD handle false positives?
What about devices with rotating MAC/private addresses (like iPhones)?
What about devices with rotating MAC/private addresses (like iPhones)?
What about devices with rotating MAC/private addresses (like iPhones)?
What happens to Command and alerts if internet is down?
What happens to Command and alerts if internet is down?
What happens to Command and alerts if internet is down?
Can KYD coexist with NAC, Zero Trust, or data platforms?
Can KYD coexist with NAC, Zero Trust, or data platforms?
Can KYD coexist with NAC, Zero Trust, or data platforms?
How are firmware updates delivered?
How are firmware updates delivered?
How are firmware updates delivered?
What are Dot’s power/throughput specs?
What are Dot’s power/throughput specs?
What are Dot’s power/throughput specs?
Can I export KYD’s immutable audit history?
Can I export KYD’s immutable audit history?
Can I export KYD’s immutable audit history?