Nyansa unveiled Voyance IoT, a comprehensive AI-based solution to integrate IoT security and device performance analytics within a single platform.
Voyance IoT automatically classifies, secures, and analyzes the behavior of IoT devices from end-to-end across enterprise wired and wireless access networks.
Voyance IoT represents a new approach to IoT operational assurance that leverages sophisticated AIOps technology to help IT, cybersecurity, and line of business proactively address key issues triggered by IoT, including:
- Continuous discovery, inventory & classification of every critical IoT device
- Baselining IoT device behavior for risk assessment and threat-detection in real-time
- Automating security enforcement to restrict access to malicious or compromised devices
- Ensuring policy adherence of critical IoT devices via micro segmentation
- Detecting and providing root cause for any IoT devices having connectivity problems
- Enabling global industry views into IoT threats, behaviors and performance benchmarks
- Tracking utilization, risk and performance of IoT devices to provide key operational insights
“Companies are spending billions on new non-traditional connected devices to drive specific business outcomes and need assurance that they are achieving the highest possible return on these investments as well as the peace of mind of knowing unmistakably, that these systems are secure,” said Abe Ankumah Co-Founder and CEO of Nyansa. “With Voyance IoT, Nyansa is addressing these pressing industry performance and security concerns on a proven AIOPs platform that has become the de facto standard for big data IT analytics.”
Voyance analyzes the end-to-end behavior of more than 20 million end devices. The benefits of this vast data combined with threat intelligence feeds yield unique value to all Voyance customers.
As a vendor-agnostic analytics solution, Voyance goes beyond simple security to give IT, cybersecurity, and line of business owners rare insight into IoT operational assurance. This includes asset inventory, connectivity, performance and root cause analysis, vulnerability management, risk assessment, and policy compliance. It also helps organizations extend their cybersecurity programs by aligning its core features to the NIST 800-53 and ISO 27K Cyber Security frameworks.
Voyance IoT now allows enterprises to automatically inventory and classify IoT devices, employing a machine learning based, hierarchical device classification system that uses the detailed behavioral signature of each detected device. Beyond automatic classification, customers are also afforded the flexibility of tagging critical devices and assets for continuous analysis within the Voyance IoT security lifecycle management framework.
Once identified, customers immediately have detailed knowledge of every single IoT device in their environment, where they are located and their level of use. They also gain insight into problematic devices that are having any kind of issues connecting to their application with insight into the root cause of the issue.
All IoT devices are fully characterized with an historic baseline of their ‘normal’ behavior. If an abnormality is detected, Voyance IoT seamlessly integrates into a customer’s cybersecurity workflow via their SIEM or other security operations system. This allows customers to enact corrective action directly within Voyance as such quarantining, revoking access, or other customer defined actions through direct integrations to their existing infrastructure.
With patented cloud-native technology that provides anonymized insights for all customers into their IoT devices’ global behavior and threat data, Voyance IoT allows our customers to compare device behavior to other anonymous Voyance customers to gain objective answers to questions surrounding IoT performance and security.
By uniquely analyzing IoT data in full context with all other infrastructure data, IT staff can now proactively find and fix performance issues, automatically identify potential threats and actively enforce policies to ensure the highest levels of security without having to purchase and deploy disparate IoT point products that represent yet another vendor IT tool to master.
The Voyance AIOps platform includes an extensive set of vendor and technology integrations, allowing customers to get the most out of their existing infrastructure and software investments.
- Network Access Control (NAC) and identity systems: Cisco ISE, Aruba/HPE ClearPass, FreeRADIUS, Microsoft RADIUS
- Security threat control platforms: Cisco’s Platform Exchange Grid (pxGrid). Voyance is a certified solution on the Cisco pxGrid ecosystem
- Wireless LAN: Cisco, Aruba/HPE, and Extreme Networks
- CMDB: ServiceNow native integration
- SIEM: Splunk and others via extensible Voyance platform APIs
- Netflow: for wired infrastructure
The Latest
According to Gartner, Inc. the following six trends will shape the future of cloud over the next four years, ultimately resulting in new ways of working that are digital in nature and transformative in impact ...
2020 was the equivalent of a wedding with a top-shelf open bar. As businesses scrambled to adjust to remote work, digital transformation accelerated at breakneck speed. New software categories emerged overnight. Tech stacks ballooned with all sorts of SaaS apps solving ALL the problems — often with little oversight or long-term integration planning, and yes frequently a lot of duplicated functionality ... But now the music's faded. The lights are on. Everyone from the CIO to the CFO is checking the bill. Welcome to the Great SaaS Hangover ...
Regardless of OpenShift being a scalable and flexible software, it can be a pain to monitor since complete visibility into the underlying operations is not guaranteed ... To effectively monitor an OpenShift environment, IT administrators should focus on these five key elements and their associated metrics ...
An overwhelming majority of IT leaders (95%) believe the upcoming wave of AI-powered digital transformation is set to be the most impactful and intensive seen thus far, according to The Science of Productivity: AI, Adoption, And Employee Experience, a new report from Nexthink ...
Overall outage frequency and the general level of reported severity continue to decline, according to the Outage Analysis 2025 from Uptime Institute. However, cyber security incidents are on the rise and often have severe, lasting impacts ...
In March, New Relic published the State of Observability for Media and Entertainment Report to share insights, data, and analysis into the adoption and business value of observability across the media and entertainment industry. Here are six key takeaways from the report ...
Regardless of their scale, business decisions often take time, effort, and a lot of back-and-forth discussion to reach any sort of actionable conclusion ... Any means of streamlining this process and getting from complex problems to optimal solutions more efficiently and reliably is key. How can organizations optimize their decision-making to save time and reduce excess effort from those involved? ...
As enterprises accelerate their cloud adoption strategies, CIOs are routinely exceeding their cloud budgets — a concern that's about to face additional pressure from an unexpected direction: uncertainty over semiconductor tariffs. The CIO Cloud Trends Survey & Report from Azul reveals the extent continued cloud investment despite cost overruns, and how organizations are attempting to bring spending under control ...

According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...
Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...