Dark Mode
The number one station for device configuration and security informationcon
The University of Kansas Health System – Case Study
Carlsberg Group Case Study
Large Credit Union
Leading US Insurance Case Study
Mishcon-de-Reya case Study
NHS Mid Cheshire Hospital Case Study
Differentiated Product Analysis
Security Configuration Management White Paper
Gytpol Validator One-Pager
Gytpol Validator Brochure
A visual Demo on how to schedule a remediation for a group of devices to Disable ...
A visual demo on how GYTPOL detects and remediates Follina with zero impact
Gytpol Validator introductory animation (2 minutes)
Tal Kollender CEO of GYTPOL shows how using GYTPOL Validator you can fix Log4J without the need for patching or waiting ...
Jony Fischbein, Check Point Technologies Global CISO talks about how GYTPOL is helping his organization protect their ...
IPv4 is the current Internet protocol; however, because the number of available IP addresses is diminishing, IPv6 will ...
New American Funding CISO Jeff Farinich talks about how GYTPOL has helped him and his security team, work faster and ...
A Microsoft Office MSHTML Remote Code Execution Vulnerability also known as CVE-2021-40444 is used in the Internet Explorer web ...
LLMNR was a protocol used that allowed name resolution without the requirement of a DNS server. It was able to provide a ...
How to disable DES and 3DES on a Domain Controller
The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote ...
Tal Kollender, and Michael Howden, VP of Emerging Technologies at Novacoast, joined for a live webinar on Securing Endpoint ...
See why Novacoast , a leading and trusted cyber security advisor selected GYTPOL as one of their security vendors to offer to their ...
Log4Shell is not straight forward. When it comes to fixing Log4J, it gets even more complicated. GYTPOL removes this complexity with ...
Tal Kollender, GYTPOL's CEO and Co-Founder presenting at the Checkpoint CPX 2020 Vienna, Innovation Challenge (6 minutes)
Jony Fischbein, Check Point Technologies Global CISO talks about how GYTPOL is helping his organization protect their endpoints and ...
Jeff Farinich, SVP Technology & CISO at New American Funding talks about how GYTPOL is helping his organization protect their ...
WHAT IS SMB V1.0 AND WHY YOU SHOULD DISABLE IT The SMB is Server Message Block protocol, this protocol is used to share files, ...
Haim Inger is the CTO of Clal Insurance, the largest insurance company in Israel. He talks about how GYTPOL solved his Active Directory ...
Microsoft no longer supports PowerShell version 2.0. It will continue to work, but it won't get patched. Instead, Microsoft wants ...
Ruben Chacon is the current Global VP and CISO at Eaton and former CISO of CDW Corporation, which is a leading provider of technology ...
The Windows Printer Spooler is a service that manages and monitors file printing. It is enabled by default. A remote code execution ...
Debug Privilege determines which users can attach to or open any process, even those they do not own. Developers who are debugging ...