Validator is an Endpoint Configuration Security (ECS) analysis suite used for IT Security and Compliance. It detects security issues and vulnerabilities caused through policy configuration flaws or missing best practices. Once detected, Validator remediates the issue, keeping your Endpoints safe and compliant.
How gyptol Validator Works
Every endpoint has a lightweight semi-agent distributed to their devices.
These endpoints could be anywhere on the network, including remotely connected employees (even without a VPN connection).
Validator then collects configuration data and metrics on the endpoint
The collection process is triggered based on a defined set of events and lasts approximately 100 seconds. When completed the information is encrypted, packaged up and fed securely to the gytpol Validator Server.
Validator processes the endpoint data together with policy and directory information
Using advanced algorithmic techniques, aggregated analysis results are displayed in a Dashboard. This can also be sent to a SIEM
Microsoft GPO & Active Directory On Premise
Microsoft Intune with Azure Public Cloud
Validator supports Microsoft Intune cloud based as well as hybrid environments. Ability to identify conflicting policies between the different environments.
Endpoint Device Types
Supporting both Desktop and Server Endpoints. Microsoft Windows, Apple macOS (using jamf) and Linux. Support for Android and IoS mobile devices are planned in the future. Support also for non-domain connected Endpoints.
Large enterprises operating multiple domains have to manage complex environments with separate and conflicting Group Policies and Directory structures. Validator provides a single view of all domains, thereby simplifying the integration process and providing a standard and secure configuration.