Promisec Inc, a US HQ company with R&D in Israel, provides an agentless endpoint management platform since 2004. Over 450 corporate customers worldwide are using Promisec products to See, Analyze and Fix IT Security policy deviations in their endpoints.
The Promisec Endpoint Manager (PEM) patented technology makes sure that the configuration of your endpoints always meets your compliance requirements. This will contribute to:
- Security of the endpoints vs. WannaCry/Petya/CCleaner breaches
- Smoother internal & external audits
- Enhanced compliance with legal requirements
Cyclic compliance scans will assure constant endpoint integrity with the corporate policy and help you identify misconfiguration or vulnerabilities. Centralized remediation can cover multiple platforms. An automation of tasks will reduce work load of your valuable security specialists.
Promisec assists you in the prevention & response to:
- System Outages
- Zero Day Attacks
- Requirement for an immediate analysis or configuration change of all your endpoints
With its reports and dashboards, PEM provides a bridge and common language between IT Security Team and IT-Operations. The offering is a holistic tool, that assists you with the adoption of sophisticated security requirements and contributes to enhanced regular endpoints operations and control.
Agentless Monitoring of complete IP Networks
Promisec Endpoint Manager (PEM) does not need agents to monitor endpoints. So, it will not disturb your operations compared to solutions that require an agent installation. It will also allow you to find and query machines slipping through your standard net supervision.
Working with IOC´s to detect security breaches
The Information Security Team can use Indicators of Compromise (IOCs) to identify systems that are working out of their compliance and may be affected with known Malwares.
‘Zero day’ attacks allocation using the ‘Wisdom of the Crowd’
With Promisec’s File Reputation module you can scan HASH of all running processes and get their File Reputation from Promisec’s integration with 3rd party partner- Reversing Labs.
This can provide almost immediate allocation of ‘Zero Day’ suspicious HASH running on your endpoints.
Central Endpoint Management
Immediate remediation after the identification of a vulnerability or misconfiguration:
- Deinstallation of ‘Black Listed’ software
- Installation of missing ‘White List’ items
- Registry Editing
- Stopping or Starting of Services
- Management of the Power Supply
- Any other remote action on the endpoints
A native integration of the Common Vulnerabilities and Exposure Database (CVE) based on the NIST CVE.org DB provides the Security Team visibility to the risk scorings per endpoint and the required patching.
Dynamic and Gapless hardware/software inventory of all endpoints
PEM allows you to inventory software packages and hardware from all endpoints based on registry evidence. This allows alignment with the number of purchased licenses and enables you to find potentially harmful software, like scanners, Key loggers etc. It also allows you to warrant that software components are up to date and installed in the context of their correct hardware metrics.
Pitch your IT against international standards or your “Golden Images”
Support for the most important international standards is built in. For instance, CIS Benchmarks, provided by the independent Center for Internet Security or DISA STIGs, a collection of 400 IT policies, which are used by the US-Ministery of Defence to secure their IT assets. The support for SCAP and OVAL allows the Security Team to write policies to allow automated compliance checks against PCI DSS, HIPAA, NERC CIP and other regulations. Another option is to compare endpoints individually against your own ‘golden images’.
Promisec´s solutions are available as a perpetual on premise software (PEM) or an Azure based SaaS subscription (Integrity).