Dark Mode
The station for device configuration and security information
U Kansas Health System streamlines security and lowers risks
Carlsberg enhances cybersecurity, automates processes
Large Credit Union transforms security operations
Mishcon de Reya rapidly improves security posture
Mid Cheshire automates ConfigSec, reinvests time savings
A composite of original research, field insights, and industry stats
Security categories, their differences, and unique value adds
Configuration security gaps and how they can be bridged
GYTPOL: Secure device configuration made simple
GYTPOL: Effortless endpoint configuration security
How GYTPOL helps its users take back control & save the day
A look at GYTPOL’s overview portal and how it’s used
Detect & correct AD/GPO misconfigurations via GYTPOL
GYTPOL helps users harden their browsers in just a few clicks
How GYTPOL adds intelligence & direction to Entra ID and Intune
How GYTPOL streamlines framework (CIS, NIST, etc.) compliance
Using GYTPOL to identify & remove unnecessary admins
A quick tutorial on patchless Log4J remediation via GYTPOL
A quick tutorial on bulk Follina remediation via GYTPOL
A quick tutorial on bulk TLSv1 remediation via GYTPOL
SMB, TLS, Log4J, local admins & auto policy re-application: oh my!
Using GYTPOL to disable IPV6 on Windows PCs & servers
Defending against the MSHTML RCE vulnerability with GYTPOL
Using GYTPOL to disable LLMNR on Windows servers & PCs
Using GYTPOL to disable DES and 3DES on Domain Controllers
Using GYTPOL to disable RC4 on Domain Controllers
SMBV1: what it is, why you should disable it & how GYTPOL can help
How to use GYTPOL to disable PowerShell 2.0 on Window servers
Quick tutorial on using GYTPOL to disable PrintSpooler
How to use GYTPOL to disable PowerShell 2.0 on Window PCs
Quick tutorial on using GYTPOL to disable debug Privilege
Check Point's CISO talks GYTPOL and its impact on the business
New American Funding uses GYTPOL to harden remote endpoints
El-Al uses GYTPOL to go beyond DMZs, firewalls, anti-viruses & EDRs
Ashdod Port repels thousands of daily attacks with GYTPOL
How Eaton used GYTPOL to deploy a technical security baseline
How Clal Insurance eliminates group policy blind spots
CEO & Co-Founder Tal Kollender presents GYTPOL at CPX
How to think like a hacker and better secure your endpoints
What it takes to win the confidence of trusted cyber advisers
An overview of the GYTPOL solution and how it adds value