FullArmor Intros Endpoint Security Manager
FullArmor, the leader in enterprise policy management, announced FullArmor Endpoint Policy Manager
BOSTON -- FullArmor, the leader in enterprise policy management, today announced FullArmor Endpoint Policy Manager™ (FullArmor EPM), which automates the delivery, enforcement, and auditing of critical security policies on mobile, disconnected and unmanaged endpoint devices, including guest machines with temporary access to the network. As a pre-admission solution for Network Access Protection (NAP) and Network Access Control (NAC), FullArmor EPM assesses, and intelligently applies the proper security policies and settings to remote desktops, laptops, mobile devices, and point-of-sale terminals. FullArmor will demonstrate FullArmor EPM at Microsoft Management Summit Booth 501 from March 26-30 in San Diego, California.
“Securing remote, mobile, and unmanaged devices that need access to protected network resources represents a large and growing risk for today’s decentralized organizations,” said Chris Liebert, Senior Analyst for the Yankee Group. “IT departments need help enforcing consistent security policies on client machines regardless of whether they are connected or disconnected from the network.”
Continuously Enforce Policy Everywhere
With the explosive growth of road warriors, tele-workers, temporary workers, and mobile users, it is virtually impossible for organizations to ensure that endpoint devices are secure and compliant. FullArmor EPM enforces consistent policy settings on endpoints whether they are connected or disconnected from an enterprise’s Active Directory. This capability enables organizations to use their existing Group Policy infrastructure to intelligently enforce endpoint policy settings as devices drift in and out of the network. To prevent security policy “decay”, FullArmor EPM automatically corrects out-of-compliance settings when they are inadvertently changed. In addition, FullArmor EPM limits quarantine and remediation events in NAP and NAC environments by keeping endpoint configurations locked-down.
About the Author
You May Also Like