CGX can perform deep inspections of devices and assess their posture. Agents can collect extensive amounts of information about the operating system version, platform,and applications, and can remediate non-compliant computers through policy actions. In addition, agents can also authenticate users and devices when connected to "open" (non-authenticating) networks.