Team size:
Essential

Discover & Verify

  • checkDiscover devices used for work
  • checkInvite-based device verification
  • checkSelf-onboarding for users
  • checkUser communication about potential risks
  • crossEnforcement at login

per year (for 50 users, unlimited devices)
Try for free
Enterprise

Custom

  • checkAll Essential & Advanced pack features
  • checkGet insights in CVEs on devices
  • checkDiscover devices in multiple IdPs
  • checkMultiple enforcement policies
  • checkAdvanced MFA features

Contact us

Talk to sales

Not sure where to start? Only discover.

Discover all devices used for work – no agent installation on devices needed.

Choose team size:

per year (unlimited devices)

Set up in just 4 clicks
  • check iconFull overview of devices used for work and potential risks
  • check iconNo agent installation needed
  • check iconSet up in only 4 clicks (No network nodes needed)

Doubting which pack suits best?

Answer 3 quick questions to find your perfect security fit - takes only 2 minutes!

1. What is your primary security goal right now?

2. How do you want to handle device non-compliance?

3. What is your approach to BYOD and overall flexibility?

Essential
Advanced
Enterprise

Understand your risk

Clear list of device issues

See all devices with known security issues such as out-of-date OS, unencrypted devices, missing antimalware, etc

check icon
check icon
check icon

Discover all devices used for work

By reading out the access logs of your identity provider, all devices used for work are discovered, before any security checks are performed

check icon
check icon
check icon

Max. number of connected identity providers

Supports Microsoft 365, Google Workspace, or Okta

1
2
5

Admin security reports

tooltip icon
Provide admins with periodic email summaries on the company's device security status, with frequency determined by the selected tier.
Limited
Weekly
Custom

Standard dashboards

Have an overview of all devices and their issues

check icon
check icon
check icon

Customized dashboards

Use filters, and adapt the dashboard based on a policy

cross icon
check icon
check icon

Mapped CVEs

See Common Vulnerabilities and Exposures (CVEs) for specific devices

cross icon
cross icon
check icon

Mitigate your risk

Respecting user privacy

XFA installs and runs without admin rights, prioritizing user privacy and minimal device control

check icon
check icon
check icon

Onboard your team with invite-based device verification

Manual and auto-invitations

check icon
check icon
check icon

Automatic device verification requests

Awareness emails to unverified discovered devices

tooltip icon
Automatically send verification emails to device owners, prompting them to install XFA and verify their device security.
Monthly
Weekly
Daily

Automatic device risk alerts

Awareness emails to devices with known issues

tooltip icon
Notify device owners about security issues with their device, including actionable guides to mitigate the risks.
On-demand
Monthly
Custom

Enforce only secure devices

Set device security requirements when accessing your digital workspace

tooltip icon
Integrate XFA as an extra factor with your identity provider or specific applications to enforce device security verification for every device that wants to authenticate to your digital workspace.
cross icon
check icon
check icon

Silent MFA

Multi-factor authentication without the hassle

tooltip icon
Powered by Passkeys technology
cross icon
check icon
check icon

Max. number of connections

Direct integration with Microsoft 365, Okta, and Onelogin, as well as SAMLv2 and OAuth2-support

cross icon
1
5

Advanced MFA features

Always require manual MFA confirmation

cross icon
cross icon
check icon

Security, connections, & integrations

Compatible with all operating systems

XFA supports Windows, macOS, Linux, iOS, iPadOS and more

check icon
check icon
check icon

Number of policies

tooltip icon
Different risk categories can be handled differently with ease.
1
3
10

Export your data to your governance tool

cross icon
check icon
check icon

Custom integrations for your organization

Onboarding & support

Self-onboarding for users

tooltip icon
Users are guided to install XFA themselves in a few clicks
check icon
check icon
check icon

Dedicated support contact

tooltip icon
Get direct access to a dedicated support representative for personalized assistance.
check icon
check icon
check icon

3 months dedicated onboarding support

tooltip icon
Receive personalized guidance to set up and optimize XFA during your first 3 months.

On-site awareness session

tooltip icon
Remote or in-person training sessions to educate your team on secure device practices and XFA usage.

Startup Discount

We believe that device security should be accessible to teams even if they don't have a dedicated IT or security person. That is why we are offering startups our solution for free for up to 2 years (max 5 users). Apply to get yours now!

Want to see how it works?

Learn how XFA helps you discover devices, raise awareness, and enforce protection to ensure full device security in your organization.

No time for a meeting?

Watch our solution video now.

cta-image

We'd love to show you our solution and how:

  • checkmark
    Every device is discovered automatically.
  • checkmark
    Security is enforced without taking control or ownership of the device.
  • checkmark
    Users can verify their devices from anywhere, in seconds.