Device Identification
Nzyme builds a continuous inventory of nearby wired and wireless devices, interlinking data across protocols and physical layers in real-time.
Real-time traffic analysis reveals what each device is doing—helping you classify them as expected, unknown, or potentially hostile based on their behavior.
Asset Discovery
You can’t defend what you don’t know. And you can’t identify what shouldn’t be there unless you first know what should be.
Nzyme builds a reliable asset inventory of Ethernet, WiFi, Bluetooth, Zigbee, Thread, and OT devices, and alerts you when new devices appear. You can classify them as approved or expected, or flag them as rogue. Built-in trilateration capabilities help you physically locate and inspect suspicious devices.
Traffic Analysis
Once you've identified a device that requires further investigation, traffic analysis becomes a powerful tool for understanding its behavior and determining its type or role.
Nzyme captures Ethernet traffic and provides a detailed summary of activity, broken down by higher-level protocols and automatically parsed into relevant information fields. Other data sources, such as WiFi, are seamlessly interlinked to offer a broader view of device behavior.
Rogue Device Detection
Nzyme comes preloaded with signatures and fingerprints for known rogue devices and attack platforms. For example, it can automatically detect devices like the WiFi Pineapple or O.MG Cable. Wireless attack platforms are identified the moment they enter range—often even before they begin an active attack.
You can also define custom fingerprints to track and detect additional attack platforms or unauthorized device types not covered by Nzyme's default library.