PRODUCTS

Validator

Validator is an Endpoint Configuration Security (ECS) analysis suite used for IT Security and Compliance.   It detects security issues and vulnerabilities caused through policy configuration flaws or missing best practices.   Once detected, Validator remediates the issue, keeping your Endpoints safe and compliant.

Validator Modules

Endpoint Threat Analysis

Discovers critical configuration vulnerabilities in endpoints. Identifies unprotected credentials & clear text passwords. Alerts local admins, unauthorized open ports, inactive anti-virus etc in endpoints

Policy Validation

Identifies Active Directory threats. Intune & Group Policy discrepancies & vulnerabilities. Verifies OS Security Updates

Redmediation

Remediation actions allowing issues to be fixed quickly and accurately without risk. Trusted knowledge you can rely on.

Endpoint Performance Optimization

Improves Start-up and Login times. Correlates delays with hardware types

Remote Workfoce Analytics

Maintain visibility on employees working from home even if they are not connected to the network by VPN.

Compliance & Audit

Major compliance standards supported including GDPR, ISO 27001, NIST, CIS, SOX, PCI DSS, HIPAA. Create and customize your own internal audit rules for validation

How gyptol Validator Works

Every endpoint has a lightweight semi-agent distributed to their devices.

These endpoints could be anywhere on the network, including remotely connected employees (even without a VPN connection).

Validator then collects configuration data and metrics on the endpoint

The collection process is triggered based on a defined set of events and lasts approximately 100 seconds.   When completed the information is encrypted, packaged up and fed securely to the gytpol Validator Server.

 

Validator processes the endpoint data together with policy and directory information

Using advanced algorithmic techniques, aggregated analysis results are displayed in a Dashboard.   This can also be sent to a SIEM

PLATFORM ENVIRONMENTS

Microsoft GPO & Active Directory On Premise

Support for the most common IT environment is based on Microsoft Domain Controllers, Active Directory and Group Policy Objects. 

Microsoft Intune with Azure Public Cloud

Validator supports Microsoft Intune cloud based as well as hybrid environments.   Ability to identify conflicting policies between the different environments.

Endpoint Device Types

Supporting both Desktop and Server Endpoints. Microsoft Windows, Apple macOS (using jamf) and Linux.   Support for Android and IoS mobile devices are planned in the future.  Support also for non-domain connected Endpoints.

Multiple Domains

Large enterprises operating multiple domains have to manage complex environments with separate and conflicting Group Policies and Directory structures.  Validator provides a single view of all domains, thereby simplifying the integration process and providing a standard and secure configuration. 

favicon_gytpol

By using this site you agree to the use of cookies for analytics, personalized content, ads, and as described in our Policy.