News

FullArmor Endpoint Policy Manager Ships

FullArmor announced it is shipping FullArmor Endpoint Policy Manager (FullArmor EPM), a management tool that automates the delivery, enforcement, and auditing of critical security policies on mobile, disconnected and unmanaged endpoint devices, such as guest laptops.

The Boston-based firm describes FullArmor EPM as a pre-admission solution for both Network Access Protection (NAP) and Network Access Control (NAC). FullArmor EPM assesses and intelligently applies security policies and settings to remote desktops, laptops, mobile devices, and point-of-sale terminals.

The tool enforces consistent policy settings on endpoints whether they are connected or disconnected from an enterprise's Active Directory, enabling organizations to use their existing Group Policy infrastructure to intelligently enforce endpoint policy settings as devices drift in and out of the network, according to company statements.

FullArmor EPM automatically corrects out-of-compliance settings when they are changed in error. Additionally, it limits quarantine and remediation events in NAP and NAC environments by keeping endpoint configurations locked-down.

To maintain security across a wide range of usage scenarios, FullArmor EPM intelligently applies specific policy settings to devices and users based on their role and/or state.

For organizations that are governed by regulatory and industry compliance requirements, FullArmor EPM maintains a comprehensive audit trail of applied security settings to automate compliance reporting.

FullArmor EPM provides a security dashboard for at-a-glance views of policy enforcement status on specific devices, groups of devices, and enterprise-wide. The dashboard identifies compliance problems and inconsistencies between expected policy status and actual policy settings for each endpoint/machine.

FullArmor Endpoint Policy Manager starts at $20 per user or managed endpoint.

About the Author

Stuart J. Johnston has covered technology, especially Microsoft, since February 1988 for InfoWorld, Computerworld, Information Week, and PC World, as well as for Enterprise Developer, XML & Web Services, and .NET magazines.

Featured

comments powered by Disqus

Subscribe on YouTube