This website uses cookies to make the content more user-friendly and effective. By using this website, you agree to the use of cookies. You can find additonal information about the use of cookies and the possibility of objecting to the use of cookies here.

8 - 10 October 2019 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Exhibitors & Products it-sa 2018
Zoom product LOGO_The Promisec Promise: Integrity Across all your Endpoints!

The Promisec Promise: Integrity Across all your Endpoints!

LOGO_The Promisec Promise: Integrity Across all your Endpoints!

The Promisec Promise: Integrity Across all your Endpoints!

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.

Information on data protection can be found here.

Send
Your message has been sent.

You do not have a registration yet? Register now and use all advantages of the Exhibitors and Products Database, the supporting programme and the TicketShop.

An error has occurred.

Promisec Inc, a US HQ company with R&D in Israel, provides an agentless endpoint management platform since 2004. Over 450 corporate customers worldwide are using Promisec products to See, Analyze and Fix IT Security policy deviations in their endpoints.

The Promisec Endpoint Manager (PEM) patented technology makes sure that the configuration of your endpoints always meets your compliance requirements. This will contribute to:

  • Security of the endpoints vs. WannaCry/Petya/CCleaner breaches
  • Smoother internal & external audits
  • Enhanced compliance with legal requirements

Cyclic compliance scans will assure constant endpoint integrity with the corporate policy and help you identify misconfiguration or vulnerabilities. Centralized remediation can cover multiple platforms. An automation of tasks will reduce work load of your valuable security specialists.

Promisec assists you in the prevention & response to:

  • Cyberattacks
  • System Outages
  • Zero Day Attacks
  • Requirement for an immediate analysis or configuration change of all your endpoints

With its reports and dashboards, PEM provides a bridge and common language between IT Security Team and IT-Operations. The offering is a holistic tool, that assists you with the adoption of sophisticated security requirements and contributes to enhanced regular endpoints operations and control.

Agentless Monitoring of complete IP Networks

Promisec Endpoint Manager (PEM) does not need agents to monitor endpoints. So, it will not disturb your operations compared to solutions that require an agent installation. It will also allow you to find and query machines slipping through your standard net supervision.

Working with IOC´s to detect security breaches

The Information Security Team can use Indicators of Compromise (IOCs) to identify systems that are working out of their compliance and may be affected with known Malwares.

‘Zero day’ attacks allocation using the ‘Wisdom of the Crowd’

With Promisec’s File Reputation module you can scan HASH of all running processes and get their File Reputation from Promisec’s integration with 3rd party partner- Reversing Labs.

This can provide almost immediate allocation of ‘Zero Day’ suspicious HASH running on your endpoints.

Central Endpoint Management

Immediate remediation after the identification of a vulnerability or misconfiguration:

  • Deinstallation of ‘Black Listed’ software
  • Installation of missing ‘White List’ items
  • Registry Editing
  • Stopping or Starting of Services
  • Management of the Power Supply
  • Any other remote action on the endpoints

CVE Integration

A native integration of the Common Vulnerabilities and Exposure Database (CVE) based on the NIST CVE.org DB provides the Security Team visibility to the risk scorings per endpoint and the required patching.

Dynamic and Gapless hardware/software inventory of all endpoints

PEM allows you to inventory software packages and hardware from all endpoints based on registry evidence. This allows alignment with the number of purchased licenses and enables you to find potentially harmful software, like scanners, Key loggers etc. It also allows you to warrant that software components are up to date and installed in the context of their correct hardware metrics.

Pitch your IT against international standards or your “Golden Images”

Support for the most important international standards is built in. For instance, CIS Benchmarks, provided by the independent Center for Internet Security or DISA STIGs, a collection of 400 IT policies, which are used by the US-Ministery of Defence to secure their IT assets. The support for SCAP and OVAL allows the Security Team to write policies to allow automated compliance checks against PCI DSS, HIPAA, NERC CIP and other regulations. Another option is to compare endpoints individually against your own ‘golden images’.

Promisec´s solutions are available as a perpetual on premise software (PEM) or an Azure based SaaS subscription (Integrity).

CyberArk Endpoint Privilege Manager

LOGO_CyberArk Endpoint Privilege Manager

Logopoint

LOGO_Logopoint

Rapid7

LOGO_Rapid7

Spyrus

LOGO_Spyrus
top

The selected entry has been placed in your favourites!

If you register you can save your favourites permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your favourites permanently. Use the instant access – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your favourites mobile too! Simply log in and access them at anytime.