|
|
|
Sygate’s solution is composed of three independent products that can
be deployed separately; but together, they provide unparalleled protection
against loss of valuable corporate information due to compromised devices,
applications, and behavior. Through a process of Continuous Protection, Sygate’s
solution automates discovery, compliance, enforcement, and remediation, ensuring
all devices that use the corporate network are compliant with security policy
and are protected. In addition to devices, the solution transparently and pervasively
covers all locations, roles, and connections so that no investment is left
behind. By protecting managed, unmanaged, and unmanageable devices across all
locations, roles, and connections, the solution enables corporations to achieve
Continuous Compliance.
Sygate Secure Enterprise combines
a sophisticated security agent that runs on each endpoint, one or
more policy management servers distributed across the enterprise,
enforcement consisting of enforcement servers on the local area network,
on remote network access points such as Wireless, VPN and RAS concentrators,
and enforcement built into each endpoint. Sygate provides remediation
through built-in software distribution, and execution capabilities
for delivery of patches, software updates, or self-running clean-up
programs. [More
Product info]
Sygate On-Demand (Formerly
Sygate Security Portal) provides
continuous protection to endpoints the corporation doesn't own (unmanaged),
yet allows on its network, such
as employees or partners connecting from their own systems, airport
kiosks, or hotel business center computers. Sygate On-Demand integrates
with Web applications to ensure the compliance of endpoints and to
protect the data that are transmitted to them through an On-Demand
Agent that downloads to each endpoint at the time of connection.
[More
Product info]
Sygate
Magellan eliminates Network Dark Matter™,
or unmanageable endpoints to ensure that all devices on the network
are known and under security management. Multiple discovery and correlation
engines run as network appliances. They identify devices and assets;
they probe configurations and services; they document de facto compliance
with security policies; they enable administrators to bring newly
discovered devices into compliance with Sygate Secure Enterprise
or Sygate On-Demand. [More
Product info]
The diagram below shows how the three products that comprise the
Sygate Solution work together to deliver continuous compliance and
unprecedented protection to the broad set of endpoints typically found
in large enterprises today.
|
|