Validator

Endpoint Configuration Security for IT Security & Compliance

Endpoint Configuration IT Security

Validator

Endpoint Configuration Security for IT Security & Compliance

Validator

Validator is an Endpoint Configuration Security (ECS) analysis suite used for IT Security and Compliance.   It detects security issues and vulnerabilities caused through policy configuration flaws or missing best practices.   Once detected, Validator remediates the issue, keeping your Endpoints safe and compliant.

First and Leading

Endpoint Configuration Security (ECS) Solution

Unique Product

Detects & remediates security risks caused through misconfigurations & wrongly applied policies. These gaps go undetected by other endpoint threat & vulnerability security tools, which are exploited by hackers.

Enables Visibility

Allows organisations to extend thier overall security protection coverage and reduce operational issues.

Endpoint Configuration Risks

Discovers critical configuration risks in endpoints. Identifies unprotected credentials & clear text passwords. Alerts local admins, unauthorized open ports, inactive anti-virus etc in endpoints

Policy Validation

Identifies Active Directory threats. Intune & Group Policy discrepancies & vulnerabilities. Verifies OS Security Updates

Remediation

Remediation actions allowing issues to be fixed quickly and accurately without risk. Trusted knowledge you can rely on.

}

Endpoint Performance Optimization

Improves Start-up and Login times. Correlates delays with hardware types

Remote Workforce Analytics

Maintain visibility on employees working from home even if they are not connected to the network by VPN.

l

Compliance & Audit

Major compliance standards supported including GDPR, ISO 27001, NIST, CIS, SOX, PCI DSS, HIPAA. Create and customize your own internal audit rules for validation

How Gyptol Validator Works

Every endpoint has a lightweight semi-agent distributed to their devices.

These endpoints could be anywhere on the network, including remotely connected employees (even without a VPN connection).

Validator then collects configuration data and metrics on the endpoint

The collection process is triggered based on a defined set of events and lasts approximately 100 seconds.   When completed the information is encrypted, packaged up and fed securely to the gytpol Validator Server.

Validator processes the endpoint data together with policy and directory information

Using advanced algorithmic techniques, aggregated analysis results are displayed in a Dashboard.   This can also be sent to a SIEM

Platform Environments

Microsoft GPO & Active Directory On Premise

Support for the most common IT environment is based on Microsoft Domain Controllers, Active Directory and Group Policy Objects.

Microsoft Intune with Azure Public Cloud

Validator supports Microsoft Intune cloud based as well as hybrid environments.   Ability to identify conflicting policies between the different environments.

Endpoint Device Types

Supporting both Desktop and Server Endpoints. Microsoft Windows, Apple macOS (using jamf) and Linux.   Support for Android and IoS mobile devices are planned in the future.  Support also for non-domain connected Endpoints.

Multiple Domains

Large enterprises operating multiple domains have to manage complex environments with separate and conflicting Group Policies and Directory structures.  Validator provides a single view of all domains, thereby simplifying the integration process and providing a standard and secure configuration.

IT Security

ENDPOINT CONFIGURATION SECURITY

Providing validation, remediation & securing of IT Policies and IT Infrastructure both on-premise and in the cloud

MIS-Configurations

MIS-CONFIGURATIONS

Perception is not the reality. This is how your weaknesses are exploited

Read the blog >

Work From Home Security

WORKING FROM HOME

Get visibility on configurations which risk your business continuity

See how >