|Full NAC solution
||Only allows authorized users and endpoints to access the network. Controls guest access, performs automatic remediation, and checks OS and endpoint configuration and updates. Supports remote locations and remote access VPNs.
||Controls network access by filtering traffic in-line. When using the in-line bridge enforcement for remote access VPNs, CyberGatekeeper is situated between the remote access VPN and the corporate network.
|Central Policy Management
||Administrators use a central policy manager to develop, deploy and manage policies. The policy manager lets administrators use the included tests, or customize tests to meet specific requirements.
|Continuous Monitoring and Enforcement
||CyberGatekeeper monitors continuously, ensuring devices remain compliant at all times. Devices that become non-compliant are immediately quarantined.
|Centralized Policy Management
||Uses a centralized policy management approach to develop, deploy and manage policies centrally. Provides higher levels of security, availability and performance throughout the entire network.
|Automatic and Manual Remediation
||Non-compliant devices are quickly repaired through automated and interactive remediation options. These options can display messages or install updates to repair the system.
|Vigilant Network Monitoring
||Network gatekeeping system monitors network 24x7 to offer peace of mind security. Non-compliant and infected systems are not allowed onto the network and systems that become non-compliant are kicked off the network.
|Automated Remediation Process
||Infected or non-compliant devices are quickly put through an automated remediation process to minimize down time and safe re-entry to network.
||Dynamic agents can be run from Firefox or Internet Explorer, allowing guests to access the network.