Roaming Security
With a remote access workforce, VPN is not enough. To secure your network
at its most vulnerable points, you need an end-to-end solution, protecting
your network from various malicious viruses, Trojan horses, and worms. You
need the total security offered by Tempest Telecom.
Endpoint Policy Management
- Simplify system updates and software distribution for mobile devices to
help reduce administration costs
-
Apply intelligent vulnerability assessment and targeted patch deployment
to enable remote-device security
-
Enforce endpoint management and security policies to help safeguard
your business
-
Manage endpoint devices without inconveniencing users to promote
improved mobile worker productivity
Today’s increasingly mobile workforce presents a real challenge
as you attempt to track and manage their ever-roving devices.
These mobile systems connect randomly from various locations
at varying access speeds, making it diffi cult to get update
packages to them in one piece or ensure that devices are
safe before they connect to your enterprise network.
Fortunately, there’s Endpoint Policy Management™ from
iPass—the simple, cost-effective way to manage and secure
remote and mobile devices when they connect to the Internet.
Endpoint Policy Management hides the complexities of managing
distributed computers while giving IT full control through
software and hardware inventories and fl exible reporting. In
addition, automated patch and anti-virus update management
lets you quickly address changing security vulnerabilities.
Reduce Administration Expense
Endpoint Policy Management signifi cantly automates remote
and mobile systems management. With accurate inventory
information and software distribution capabilities, there’s no
need to mail update CDs to distributed users or have out-ofcompliance
systems shipped back to IT.
-
Hardware and Software Inventory: Gain precise inventories of all hardware
and software installed on your endpoint devices. Use this valuable
data to determine the full extent and confi guration of your remote and
mobile assets.
-
Software Distribution: Deploy new applications, distribute software
updates or simply automate many daily routine IT tasks on distributed
devices. Count on the solution’s smart, fl exible package editor to script
and compile updates as needed, based on your specifi c needs.
-
Active Directory Integration*: Leverage your existing user groups to set
policies, so you can streamline processes and avoid maintaining separate
user databases.
Secure Remote Devices
Endpoint Policy Management gives you the tools to quickly
assess vulnerabilities and target security patch deployments
to groups of users or individual systems.
-
Automated Patch Assessment and Remediation: Simplify the ongoing
task of administering Microsoft OS patches by leveraging patch management
expertise from Shavlik Technologies. Each time an OS patch is
released from Microsoft, it directly becomes available through Endpoint
Policy Management.
-
Real-time Reporting: Receive up-to-date reports on any aspect of hardware,
software, OS patches and anti-virus levels, eliminating much of the
guesswork associated with mobile administration.
-
Targeting by Group: Target update packages to those PCs that actually
require them, based on grouping by OS, software, anti-virus update history
and machine type.
Safeguard Your Business
Not only can you protect mobile devices from threats on the
Internet, you can also protect your network from vulnerable
devices. Endpoint Policy Management enables administrators
to restrict access by devices that are not fully compliant,
and to ensure that remote and mobile workers get the
security updates they need to obtain full network access
and remain productive.
-
Pre-VPN Updates: Ensure that OS patches, anti-virus defi nitions and software
are up-to-date prior to granting access to the Internet or establishing
a VPN tunnel to your network.
-
Endpoint Lockdown: Optional integration with personal fi rewalls enables
IT to apply rules for locking and unlocking the fi rewall at different points
in the connection process, based on the remediation status of the device.
This helps to prevent non-compliant devices from accessing the Internet or
the corporate network.
-
Remove Sensitive Information: Protect the proprietary information that
resides on your mobile devices by removing confi dential data, encrypting
hard drives or even disabling computers in the event they are stolen.
-
Universal Policy Enforcement: Combine Endpoint Policy Management
with the iPassConnect™ universal client and DeviceID service to control VPN
launch tightly to enable true policy enforcement.
Increase Mobile Worker Productivity
Endpoint Policy Management is specifically designed to
optimize systems management in mobile environments
while minimizing the impact on workers.
-
Priority Controls: Balance management and productivity by defining
an update as high priority or normal priority and whether a high-speed
connection is required.
-
Dynamic Bandwidth Throttling: Keep users productive while noncritical
remediation occurs in the background by automatically
measuring the speed and utilization of a user’s connection to allocate
bandwidth accordingly.
-
Checkpoint Restart: Automatically resume a previous download at
the point where it left off, enabling files to be downloaded over a series
of connections.