Starter

Discover & Monitor devices
without an agent

Get insights into device security in your organization by uncovering all devices used for work - no agent installation on devices needed.

Discover & Monitor devices <br />without an agent
Choose team size:

per year (unlimited devices)

Try for free
  • check iconFull overview of devices used for work and potential risks
  • check iconNo agent installation or network nodes needed
  • check iconSet up in only 4 clicks
Team size:
Essential

Invite-only

Onboard your team with invite-based device verification using a privacy-respecting agent.

per year (for 50 users, unlimited devices)


  • checkAll Starter pack features
  • checkUser communication about potential risks
  • checkManual and auto-invitations
  • checkSelf-onboarding for users
  • crossEnforcement at login
Enterprise

Custom

Unlimited scalability for every device and integration in your business.

Contact us


  • checkAll Advanced pack features
  • checkGet insights in CVEs on devices
  • checkEnforcement on multiple applications
  • checkDiscover devices in multiple IdPs
  • checkAdvanced MFA features
Change currency:
Starter
Essential
Advanced
Enterprise

Understand your risk

Clear list of device issues

See all devices with known security issues such as out-of-date OS, unencrypted devices, missing antimalware, etc

check icon
check icon
check icon
check icon

Discover all devices used for work

By reading out the access logs of your identity provider, all devices used for work are discovered, before any security checks are performed

check icon
check icon
check icon
check icon

Max. number of connected identity providers

Supports Microsoft 365, Google Workspace, or Okta

1
1
2
5

Admin security reports

tooltip icon
Provide admins with periodic email summaries on the company's device security status, with frequency determined by the selected tier.
Limited
Limited
Weekly
Custom

Standard dashboards

Have an overview of all devices and their issues

check icon
check icon
check icon
check icon

Customized dashboards

Use filters, and adapt the dashboard based on a policy

cross icon
cross icon
check icon
check icon

Mapped CVEs

See Common Vulnerabilities and Exposures (CVEs) for specific devices

cross icon
cross icon
cross icon
check icon

Mitigate your risk

Respecting user privacy

XFA installs and runs without admin rights, prioritizing user privacy and minimal device control

cross icon
check icon
check icon
check icon

Onboard your team with invite-based device verification

Manual and auto-invitations

cross icon
check icon
check icon
check icon

Automatic device verification requests

Awareness emails to unverified discovered devices

tooltip icon
Automatically send verification emails to device owners, prompting them to install XFA and verify their device security.
cross icon
Monthly
Weekly
Daily

Automatic device risk alerts

Awareness emails to devices with known issues

tooltip icon
Notify device owners about security issues with their device, including actionable guides to mitigate the risks.
cross icon
On-demand
Monthly
Custom

Enforce only secure devices

Set device security requirements when accessing your digital workspace

tooltip icon
Integrate XFA as an extra factor with your identity provider or specific applications to enforce device security verification for every device that wants to authenticate to your digital workspace.
cross icon
cross icon
check icon
check icon

Silent MFA

Multi-factor authentication without the hassle

tooltip icon
Powered by Passkeys technology
cross icon
cross icon
check icon
check icon

Max. number of connections

Direct integration with Microsoft 365, Okta, and Onelogin, as well as SAMLv2 and OAuth2-support

cross icon
cross icon
1
5

Advanced MFA features

Always require manual MFA confirmation

cross icon
cross icon
cross icon
check icon

Security, connections, & integrations

Compatible with all operating systems

XFA supports Windows, macOS, Linux, iOS, iPadOS and more

cross icon
check icon
check icon
check icon

Number of policies

tooltip icon
Different risk categories can be handled differently with ease.
cross icon
1
3
10

Export your data to your governance tool

cross icon
cross icon
check icon
check icon

Custom integrations for your organization

Onboarding & support

Self-onboarding for users

tooltip icon
Users are guided to install XFA themselves in a few clicks
cross icon
check icon
check icon
check icon

Dedicated support contact

tooltip icon
Get direct access to a dedicated support representative for personalized assistance.
cross icon
check icon
check icon
check icon

3 months dedicated onboarding support

tooltip icon
Receive personalized guidance to set up and optimize XFA during your first 3 months.

On-site awareness session

tooltip icon
Remote or in-person training sessions to educate your team on secure device practices and XFA usage.

Want to see how it works?

Learn how XFA helps you discover devices, raise awareness, and enforce protection to ensure full device security in your organization.

No time for a meeting?

Watch our solution video now.

cta-image

We'd love to show you our solution and how:

  • checkmark
    Every device is discovered and secured automatically.
  • checkmark
    Protection is applied without taking control or ownership of the device.
  • checkmark
    Users can self-verify their devices from anywhere, in seconds.