Skip Navigation LinksRoaming Security

Security With a remote access workforce, VPN is not enough. To secure your network at its most vulnerable points, you need an end-to-end solution, protecting your network from various malicious viruses, Trojan horses, and worms. You need the total security offered by Tempest Telecom.

Endpoint Policy Management
  • Simplify system updates and software distribution for mobile devices to help reduce administration costs
  • Apply intelligent vulnerability assessment and targeted patch deployment to enable remote-device security
  • Enforce endpoint management and security policies to help safeguard your business
  • Manage endpoint devices without inconveniencing users to promote improved mobile worker productivity

Today’s increasingly mobile workforce presents a real challenge as you attempt to track and manage their ever-roving devices. These mobile systems connect randomly from various locations at varying access speeds, making it diffi cult to get update packages to them in one piece or ensure that devices are safe before they connect to your enterprise network.

Fortunately, there’s Endpoint Policy Management™ from iPass—the simple, cost-effective way to manage and secure remote and mobile devices when they connect to the Internet. Endpoint Policy Management hides the complexities of managing distributed computers while giving IT full control through software and hardware inventories and fl exible reporting. In addition, automated patch and anti-virus update management lets you quickly address changing security vulnerabilities.

Reduce Administration Expense

Endpoint Policy Management signifi cantly automates remote and mobile systems management. With accurate inventory information and software distribution capabilities, there’s no need to mail update CDs to distributed users or have out-ofcompliance systems shipped back to IT.

  • Hardware and Software Inventory: Gain precise inventories of all hardware and software installed on your endpoint devices. Use this valuable data to determine the full extent and confi guration of your remote and mobile assets.
  • Software Distribution: Deploy new applications, distribute software updates or simply automate many daily routine IT tasks on distributed devices. Count on the solution’s smart, fl exible package editor to script and compile updates as needed, based on your specifi c needs.
  • Active Directory Integration*: Leverage your existing user groups to set policies, so you can streamline processes and avoid maintaining separate user databases.
Secure Remote Devices

Endpoint Policy Management gives you the tools to quickly assess vulnerabilities and target security patch deployments to groups of users or individual systems.

  • Automated Patch Assessment and Remediation: Simplify the ongoing task of administering Microsoft OS patches by leveraging patch management expertise from Shavlik Technologies. Each time an OS patch is released from Microsoft, it directly becomes available through Endpoint Policy Management.
  • Real-time Reporting: Receive up-to-date reports on any aspect of hardware, software, OS patches and anti-virus levels, eliminating much of the guesswork associated with mobile administration.
  • Targeting by Group: Target update packages to those PCs that actually require them, based on grouping by OS, software, anti-virus update history and machine type.
Safeguard Your Business

Not only can you protect mobile devices from threats on the Internet, you can also protect your network from vulnerable devices. Endpoint Policy Management enables administrators to restrict access by devices that are not fully compliant, and to ensure that remote and mobile workers get the security updates they need to obtain full network access and remain productive.

  • Pre-VPN Updates: Ensure that OS patches, anti-virus defi nitions and software are up-to-date prior to granting access to the Internet or establishing a VPN tunnel to your network.
  • Endpoint Lockdown: Optional integration with personal fi rewalls enables IT to apply rules for locking and unlocking the fi rewall at different points in the connection process, based on the remediation status of the device. This helps to prevent non-compliant devices from accessing the Internet or the corporate network.
  • Remove Sensitive Information: Protect the proprietary information that resides on your mobile devices by removing confi dential data, encrypting hard drives or even disabling computers in the event they are stolen.
  • Universal Policy Enforcement: Combine Endpoint Policy Management with the iPassConnect™ universal client and DeviceID service to control VPN launch tightly to enable true policy enforcement.
Increase Mobile Worker Productivity

Endpoint Policy Management is specifically designed to optimize systems management in mobile environments while minimizing the impact on workers.

  • Priority Controls: Balance management and productivity by defining an update as high priority or normal priority and whether a high-speed connection is required.
  • Dynamic Bandwidth Throttling: Keep users productive while noncritical remediation occurs in the background by automatically measuring the speed and utilization of a user’s connection to allocate bandwidth accordingly.
  • Checkpoint Restart: Automatically resume a previous download at the point where it left off, enabling files to be downloaded over a series of connections.
Skip Navigation LinksHome : Solutions Overview : Technical Solutions : Roaming Security
Web Development by: Agave Information Solutions