If your organization has a need to identify third-party devices and apply security
policy rules based on that identity, you can use the Cloud Identity Engine along
with Prisma® Access to apply information from third-party IoT detection sources to
simplify the task of identifying and closing security gaps for devices in your
network. This
API-driven integration automatically
simplifies security enforcement by leveraging information from third-party IoT
visibility solutions via the Cloud Identity Engine, ensuring comprehensive device
visibility and control by using Prisma Access security policy rules that are robust
and context-aware.