Configuration Hardening

Validator is an Endpoint Configuration Security (ECS) analysis suite used for IT Security and Compliance. It detects security issues and vulnerabilities caused through policy configuration flaws or missing best practices. Once detected, Validator remediates the issue, keeping your Endpoints safe and compliant. Providing validation, remediation & securing of IT Policies and IT Infrastructure both on-premise and in the cloud. View Gytpol Solutions South Africa.

Endpoint Threat Analysis

  • Discovers critical configuration vulnerabilities in endpoints
  • Identifies unprotected credentials & clear text passwords Alerts local admins, unauthorized open ports, inactive
  • anti-virus etc in endpoints

Compliance & Audit

  • Accurate compliance & audit status at the endpoints
  • Supports: GDPR, SOX, ISO 27001, PCI DSS, CIS, NIST, HIPAA

Policy Validation

  • Identifies Azure & OnPrem Active Directory threats Intune & Group Policy discrepancies & vulnerabilities
  • Verifies Security Updates are in place
  • Enterprise wide unified Security Baseline

Endpoint Performance

  • Improves Start-up and Login times.
  • Correlates delays with hardware types