Average Ratings 0 Ratings
Average Ratings 1 Rating
API Access
Has API
API Access
Has API
Integrations
Juniper Advanced Threat Protection
Juniper Cloud Workload Protection
Juniper SASE
Juniper SD-WAN
Juniper Secure Edge
Juniper Session Smart Router
Marvis Virtual Network Assistant
Pandora FMS
Pliant
Quickwork
Integrations
Juniper Advanced Threat Protection
Juniper Cloud Workload Protection
Juniper SASE
Juniper SD-WAN
Juniper Secure Edge
Juniper Session Smart Router
Marvis Virtual Network Assistant
Pandora FMS
Pliant
Quickwork
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
SaaS
iPhone
iPad
Android
Windows
Mac
Linux
Deployment
SaaS
iPhone
iPad
Android
Windows
Mac
Linux
Support
Phone Support
24/7 Live Support
Online
Support
Phone Support
24/7 Live Support
Online
Training
Documentation
Webinars
Live Online
In Person
Training
Documentation
Webinars
Live Online
In Person
Vendor Details
Company Name
Juniper Mist AI
Founded
1996
Country
United States
Website
www.juniper.net/us/en/products/mist-ai.html
Vendor Details
Company Name
Mist Systems
Founded
2014
Country
United States
Website
www.mist.com/learning-wlan/
Product Features
Artificial Intelligence
Chatbot
For Healthcare
For Sales
For eCommerce
Image Recognition
Machine Learning
Multi-Language
Natural Language Processing
Predictive Analytics
Process/Workflow Automation
Rules-Based Automation
Virtual Personal Assistant (VPA)
Network Automation
Compliance Monitoring
Configuration Backup
Configuration Changes
Network Orchestration
Performance Monitoring
Tool Access Control
Vulnerability Assessments
Product Features
Location-Based Marketing
Audience Demographics
Beacons (BLE)
Contextual Marketing
Footfall Analytics
Geofencing
Location Intelligence
Marketing Attribution
Marketing Automation
NFC
Personalization
Push Notifications
QR Codes
Reporting / Analytics
Social Marketing
Wi-Fi
Network Traffic Analysis (NTA)
Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption