Impulse Point Intros Identity Based BYOD Registration Solution

Impulse Point has launched a new identity-based device registration solution, IdentityConnect, a bundled hardware and software appliance that helps organizations identify, register, and track personal devices on the network.

IdentityConnect can associate a single user with multiple devices, which enables organizations to apply settings such as bandwidth allocation or firewall rules by user across all of their devices.

The solution uses the company's SessionsTracker technology to provide the real-time identity-to-device information required for identity persistence. When a device connects to the network, IdentityConnect automatically identifies it and associates the user's identity with the newly assigned IP address, so users can move between wireless access points on campus without having to reauthenticate each time.

IdentityConnect includes hooks to integrate with DHCP, LDAP, and RADIUS protocols for correlation of IP address, MAC address, and user identity. It can support third-party network management devices, such as web content filters, bandwidth packet shapers, next-generation firewalls, and security event information management (SEIM) devices that require real-time identity-to-device correlation.

Each appliance can support up to 10,000 concurrent devices and can be clustered to support tens of thousands of devices.

Key features of IdentityConnect include:

  • Agentless device and role profiling for visibility into user identities and device types connected to the network;
  • Guest user self-enrollment for Internet-only network access;
  • User device self-enrollment for non-browser devices such as printers;
  • Identity correlation management for real-time identity-to-device association and standards-based integration with third-party policy management systems; and
  • Managed support services for updated device type fingerprinting within 48 hours of official release date.

Further information about IdentityConnect can be found at impulse.com.

About the Author

Leila Meyer is a technology writer based in British Columbia. She can be reached at [email protected].

Featured

  • DreamBox Math

    Discovery Education Announces Updates to Experience, DreamBox Math

    K-12 learning solution provider Discovery Education has announced enhancements to its Discovery Education Experience and DreamBox Math products, designed to create a more personalized, engaging learning experience for students.

  • abstract pattern of cybersecurity, ai and cloud imagery

    Report Identifies Malicious Use of AI in Cloud-Based Cyber Threats

    A recent report from OpenAI identifies the misuse of artificial intelligence in cybercrime, social engineering, and influence operations, particularly those targeting or operating through cloud infrastructure. In "Disrupting Malicious Uses of AI: June 2025," the company outlines how threat actors are weaponizing large language models for malicious ends — and how OpenAI is pushing back.

  • digital dashboard featuring a shield icon, graphs, a world map, and network nodes

    IBM Launches Agentic AI Governance and Security Platform

    IBM has introduced a new software stack for enterprise IT teams tasked with managing the complex governance and security challenges posed by autonomous AI systems.

  • laptop and fish hook

    Security Researchers Identify Generative AI 'Vishing' Attack

    A new report from researchers at Ontinue's Cyber Defense Center has identified a complex, multi-stage cyber attack that leveraged social engineering, remote access tools, and signed binaries to infiltrate and persist within a target network.