Education

  • De-risks whole IT estate via single console (or hierarchy)
  • Puts C-Suite back in control
  • Enables duty of care to students and employees
  • Satisfies General Data Protection Regulation controls
  • Allows for fixed annual security budget
  • Deployment is achieved using standard Microsoft toolset
  • In non-dynamic environment is fit & forget – no updates
  • Works across Virtual & Physical endpoints including Servers
  • Scalable to 10,000’s of endpoints
  • Reduces consultancy fees
Education

Healthcare

  • De-risks whole IT estate via single console (or hierarchy)
  • Puts C-Suite back in control
  • Extends operating system lifecycle – particularly useful for supplier accredited medical devices – MRI scanners, X-Ray machines etc.
  • Satisfies General Data Protection Regulation (GDPR) controls,
  • Provable compliance to the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and or its equivalent
  • Protects confidential patient data in extremis – individual file protection with access legend
  • Prevents System Administrators from inadvertently “borking” an estate
  • Full change control with proper governance – enforces proper evaluation of software prior to roll-out
  • Reduces consultancy fees

Local Government

  • De-risks whole IT estate via single console (or hierarchy of consoles)
  • Puts C-Suite back in control
  • Enables duty of care to citizens and employees
  • Satisfies General Data Protection Regulation controls
  • Allows for fixed annual security budget
  • Works across Virtual & Physical endpoints including servers Strong protection as self-hardening
  • No updates required
  • Protects against USB or any other threat surface
  • Deployment is achieved using standard Microsoft toolset(s)
  • In non-dynamic environment is fit & forget – no updates
  • Allows approved software supplier updates and patches
  • Scalable to 10,000’s of endpoints
  • Minimal administration with full logging
  • Full change control with proper governance – g., Patching cycle is now brought under control at zero risk

Aviation

  • De-risks whole IT estate via single console (or hierarchy)
  • Protects older operating Systems back to NT4, particularly useful in air-gapped environments g., Air Traffic & Control
  • Fast accreditation due to tiny software footprint (under 100kbs)
  • Strong protection as self-hardening
  • No updates required
  • Protects against USB or any other threat surface
  • Satisfies General Data Protection Regulation controls
  • Allows for fixed annual security budget
  • Deployment is achieved using standard Microsoft toolset
  • In non-dynamic environment is fit & forget – no updates
  • Works across Virtual & Physical endpoints including Servers
  • Scalable to 10,000’s of endpoints

Manufacturing

  • De-risks whole IT estate via single console (or hierarchy)
  • Protects older operating Systems back to NT4, particularly useful in air-gapped environments g., SCADA
  • Fast accreditation due to tiny software footprint (under 100kbs)
  • Strong protection as self-hardening
  • No updates required
  • Protects against remote engineers USB infection or any other threat surface
  • Satisfies General Data Protection Regulation controls
  • Allows for fixed annual endpoint security budget
  • Deployment is achieved using standard Microsoft toolset or can be deployed manually in situ
  • In non-dynamic environment is fit & forget – no updates
  • Works across Virtual & Physical endpoints including Servers
  • Scalable to 10,000’s of endpoints

Finance

  • De-risks whole IT estate via single console (or hierarchy)
  • Protects older operating Systems back to NT4, particularly useful in high flow transaction environments – g., FOREX Server farms supporting Governance Risk & Compliance (GRC)
  • Zero Latency-no measurable “bump in the wire”.
  • Fast accreditation due to tiny software footprint (under 100kbs)
  • Strong protection as self-hardening
  • No updates required
  • Protects against remote engineers USB infection or any other threat surface
  • Satisfies General Data Protection Regulation controls
  • Allows for fixed annual Endpoint security budget
  • Seamlessly integrates with other security toolsets
  • Can deploy with pre-existing monitoring and governance solutions through sys-logs g., HP’s ArcSite or RSA’s Archer to achieve (single pain of glass)
  • Deployment is achieved using standard Microsoft toolsets (and others) or can be deployed manually in situ
  • In non-dynamic environment is fit & forget – no updates
  • Works across Virtual & Physical endpoints including Servers
  • Scalable to 10,000’s of endpoints
  • Measurable contribution to Carbon Footprint reduction -especially across Data Centre

Energy

  • De-risks whole IT estate via single console (or hierarchy)
  • Protects older operating Systems back to NT4, especially useful in power stations during de-commissioning
  • Also Proven in Civil Nuclear environments
  • Works in Air-gapped environments with “NO” degradation of effectiveness
  • Powerful tool in providing assurance of Governance Risk & Compliance (GRC)
  • Fast accreditation due to tiny software footprint (under 100kbs)
  • Strong protection as self-hardening
  • No updates required
  • Protects against remote engineers USB infection or any other threat surface
  • Works in SCADA and other minimal footprint environments
  • Satisfies General Data Protection Regulation controls
  • Allows for fixed annual Endpoint security budget
  • Seamlessly integrates with other security toolsets
  • Can deploy with pre-existing monitoring and governance solutions through sys-logs g., HP’s ArcSite or RSA’s Archer to achieve (single pain of glass)
  • Deployment is achieved using standard Microsoft toolsets (and others) or can be deployed manually in situ
  • In non-dynamic environment is fit & forget – no updates
  • Works across Virtual & Physical endpoints including Servers
  • Scalable to 10,000’s of endpoints