|
|
|
|
Sygate®
Secure Enterprise
Enterprise
Security Through Policy Enforcement
Overview
Features
-
Detect, block, and alert attempted intrusions in real-time
-
Enforce a profile of trusted network behavior
-
Deploy security policy based on user, location, and adapter
- Control
Internet application usage
-
Log, track, and graphically report all network activity
-
Update security policy rapidly in emergency situations
- Automatically
update agent software
Sygate
Secure Enterprise 2.0
Sygate
Secure Enterprise has three components that work in unison
to protect enterprise networks from security threats:
Sygate
Management Server
Sygate
Management Server 2.0 provides IT departments with a central
point of control over all Sygate Security Agents and enables
administrators to define, deploy, monitor, and enforce security
policy across the entire network. Administrators define
security policy profiles by creating rules that link the
following parameters: user, computer, application, port,
protocol, time, host, location, and adapter. Security Policies
can be as simple as blocking one application across your
entire network or as sophisticated as creating a complete
profile of trusted communication. The security policies
are automatically implemented according to an enterprise
group structure, which can be defined manually or imported
from commonly used directory services such as NT domain
or LDAP.
Sygate
Security Agent
Sygate
Security Agent 2.0 enforces rule-based security on all enterprise
devices, both remote and local, based on policies defined
by Sygate Management Server. Sygate Security Agent uses
a sophisticated security engine that combines an application-centric
firewall with intrusion detection capabilities.
Sygate
VPN Enforcer
Sygate
VPN Enforcer ensures that users connecting through VPN are
running Sygate Security Agent, and have the correct security
policy, before allowing access to the corporate network.
VPN enforcement protects corporate assets from users who
try to disable Sygate Security Agent and hackers that attempt
to masquerade as a legitimate user.
Key Benefits
- Centralized
Management –
Sygate Management Server provides a central point for
defining and deploying policies, monitoring security,
and updating the agent software.
- Automated
Deployment – Sygate Secure Enterprise integrates
with existing enterprise security infrastructure such
as LDAP and NT domains to import user and computer information,
expediting deployment. Administrators can automatically
deploy security policies globally or by user and computer
groups.
- Distributed
Architecture – Sygate Secure Enterprise can
be scaled to meet the needs of any enterprise. Sygate
Management Server features a multi-server architecture
that links all Sygate Management Servers across the entire
enterprise.
- End-User
Transparency
– Sygate Security Agent 2.0 can be completely transparent
to the end-user, with no tray icon or Programs menu entry.
The transparency of the agent software and minimal impact
on the installed device reduces help desk calls and administration
costs.
Minimum
System Requirements
Sygate
Management Server
-
Pentium III 600 Mhz or greater
- 256
MB RAM
- 200
MB free disk space
- 1024x768
resolution or higher
- Internet
Information Services 5.0
- Microsoft
SQL 7.0 or 2000
- Windows
2000 Server
Sygate
Security
Agent
- Pentium
133 or equivalent
- 32
MB RAM
- 10
MB free disk space
- Internet
Explorer Version 4.0 or later
- Windows
95, 98, ME, NT (Workstation or Server), or 2000 (Pro or
Server)
Sygate
VPN Enforcer
- Windows
NT 4.0 or Windows 2000 Server
- 128
MB RAM
- 250
MB free disk space
- Two
network interface cards installed
<<
Back To Top >>
|
|
|
Home
| Company
| Products
| News
| Downloads
| Buy
| Support
| Partners
| Contact
Us |
1997-2001
Sygate Technologies, Inc.
All content, brands,
and products referenced herein are the trademarks or registered trademarks of
their respective holders. Sygate® is a registered trademark of Sygate Technologies,
Inc. No part of this document may be reproduced or transmitted in any form or
by any means, electronic, mechanical, or otherwise, without prior written permission
of Sygate Technologies, Inc. Please be advised that Sygate Technologies, Inc.
actively and aggressively enforces its intellectual property rights to the fullest
extent of the law.
|
|