Starter

Discover & Monitor devices without an agent

Get insights into device security in your organization by uncovering all devices used for work - no agent installation on devices needed.

Discover & Monitor devices without an agent
1-50 users

per year

Try for free
51-500 users

per year

Try for free
501+ users

Contact us

per year

Talk to sales
  • check iconFull overview of devices used for work and potential risks
  • check iconExtracted from authentication logs
    (No agent installation needed)
  • check iconSet up in only 4 clicks
    (No network nodes needed)
Team size:
Essential

Invite-only

Onboard your team with invite-based device verification using a privacy-respecting agent.

per year (for 50 users, unlimited devices)


  • checkAll Starter pack features
  • checkUser communication about potential risks
  • checkManual and auto-invitations
  • checkSelf-onboarding for users
  • crossEnforcement at login
Enterprise

Custom

Unlimited scalability for every device and integration in your business.

Contact us


  • checkAll Advanced pack features
  • checkGet insights in CVEs on devices
  • checkEnforcement on multiple applications
  • checkDiscover devices in multiple IdPs
  • checkAdvanced MFA features
Change currency:
Starter
Essential
Advanced
Enterprise

Understand your risk

Clear list of device issues

See all devices with known security issues such as out-of-date OS, unencrypted devices, missing antimalware, etc

check icon
check icon
check icon
check icon

Discover all devices used for work

By reading out the access logs of your identity provider, all devices used for work are discovered, before any security checks are performed

check icon
check icon
check icon
check icon

Max. number of connected identity providers

Supports Microsoft 365, Google Workspace, or Okta

1
1
2
5

Standard dashboards

Have an overview of all devices and their issues

check icon
check icon
check icon
check icon

Customized dashboards

Use filters, and adapt the dashboard based on a policy

cross icon
cross icon
check icon
check icon

Admin security reports

tooltip icon
Provide admins with periodic email summaries on the company's device security status, with frequency determined by the selected tier.
Limited
Limited
Weekly
Custom

Mapped CVEs

See Common Vulnerabilities and Exposures (CVEs) for specific devices

cross icon
cross icon
cross icon
check icon

Mitigate your risk

Respecting user privacy

XFA installs and runs without admin rights, prioritizing user privacy and minimal device control

N/A
check icon
check icon
check icon

Onboard your team with invite-based device verification

Manual and auto-invitations

N/A
check icon
check icon
check icon

Enforce only secure devices

Set device security requirements when accessing your digital workspace

tooltip icon
Integrate XFA as an extra factor with your identity provider or specific applications to enforce device security verification for every device that wants to authenticate to your digital workspace.
N/A
cross icon
check icon
check icon

Silent MFA

Multi-factor authentication without the hassle

tooltip icon
Powered by Passkeys technology
N/A
cross icon
check icon
check icon

Advanced MFA features

Always require manual MFA confirmation

N/A
cross icon
cross icon
check icon

Automatic device verification requests

Awareness emails to unverified discovered devices

tooltip icon
Automatically send verification emails to device owners, prompting them to install XFA and verify their device security.
N/A
Monthly
Weekly
Daily

Automatic device risk alerts

Awareness emails to devices with known issues

tooltip icon
Notify device owners about security issues with their device, including actionable guides to mitigate the risks.
N/A
On-demand
Monthly
Custom

Max. number of connections

Direct integration with Microsoft 365, Okta, and Onelogin, as well as SAMLv2 and OAuth2-support

N/A
cross icon
1
5

Security, connections, & integrations

Compatible with all operating systems

XFA supports Windows, macOS, Linux, iOS, iPadOS and more

N/A
check icon
check icon
check icon

Export your data to your governance tool

N/A
cross icon
check icon
check icon

Number of policies

tooltip icon
Different risk categories can be handled differently with ease.
N/A
1
3
10

Custom integrations for your organization

Onboarding & support

Self-onboarding for users

tooltip icon
Users are guided to install XFA themselves in a few clicks
N/A
check icon
check icon
check icon

Dedicated support contact

tooltip icon
Get direct access to a dedicated support representative for personalized assistance.
N/A
check icon
check icon
check icon

3 months dedicated onboarding support

tooltip icon
Receive personalized guidance to set up and optimize XFA during your first 3 months.

On-site awareness session

tooltip icon
Remote or in-person training sessions to educate your team on secure device practices and XFA usage.

Want to see how it works?

Learn how XFA helps you discover devices, raise awareness, and enforce protection to ensure full device security in your organization.

No time for a meeting?

Watch our solution video now.

cta-image

We'd love to show you our solution and how:

  • checkmark
    Every device is discovered and secured automatically.
  • checkmark
    Protection is applied without taking control or ownership of the device.
  • checkmark
    Users can self-verify their devices from anywhere, in seconds.