If your organization has a need to identify third-party devices and apply security
                policy rules based on that identity, you can use the Cloud Identity Engine along
                with Prisma® Access to apply information from third-party IoT detection sources to
                simplify the task of identifying and closing security gaps for devices in your
                network. This 
API-driven integration automatically
                simplifies security enforcement by leveraging information from third-party IoT
                visibility solutions via the Cloud Identity Engine, ensuring comprehensive device
                visibility and control by using Prisma Access security policy rules that are robust
                and context-aware.