Softprom — IT Distributor
  • FUNCTIONS
  • HOW IT WORKS
  • CONSULTATION
  • ABOUT COMPANY
  • CONTACTS
  • EN | English
    • PL | Polski
SoftpromLogoWhiteSmall
  • FUNCTIONS
  • HOW IT WORKS
  • CONSULTATION
  • ABOUT COMPANY
  • CONTACTS
  • EN | English
    • PL | Polski
✕

    Get In Touch

    email: info@softprom.com

    website: softprom.com

    Representative Offices

    We cover 34 countries in Eastern & Central Europe and the CIS

    Map: https://softprom.com/contacts

    Follow us on Facebook Follow us on LinkedIn Follow us on Twitter Follow us on Instagram
    ✕
    SoftpromLogoWhiteSmall
    • FUNCTIONS
    • HOW IT WORKS
    • CONSULTATION
    • ABOUT COMPANY
    • CONTACTS
    • EN | English
      • PL | Polski
    • English
    • Deutsch
    • Polski

    EXPLORE MORE

    Follow us on Facebook Follow us on LinkedIn Follow us on YouTube
    SoftpromLogoWhiteSmall
    • FUNCTIONS
    • HOW IT WORKS
    • CONSULTATION
    • ABOUT COMPANY
    • CONTACTS
    • EN | English
      • PL | Polski
    SECURITY CONFIGURATION MANAGEMENT PLATFORM

    Gytpol — visibility of security gaps with Automatic Remediation

    REQUEST DEMO

    Full visibility. Continuously monitoring all devices, even remote ones. Detects risks due to non-compliance and misconfigurations.

    Remediates. It’s fast, automatic, shows the potential impact and you can roll back. End to End coverage: Devices, Service infrastructure, and Cloud.

    Advanced compliance CIS, Microsoft Security Baseline, MITRE ATT&CK Framework. Achieve a higher level of compliance with GYTPOL intelligence coverage.

    HOW IT WORKS. GYTPOL IS BASED ON HACKER LOGIC TO PREVENT CYBER SECURITY BREACHES.

    What is Gytpol Validator?

    GYTPOL Validator is providing a unique view of your misconfiguration security gaps with continuous monitoring of all your devices. Remove risks with rapid and automatic remediation with zero impact to existing business operations...
    REQUEST DEMO

    SECURITY CONFIGURATION MANAGEMENT PLATFORM — GYTPOL VALIDATOR

    DASHBOARD

    Executive view of the most important and critical issues to prioritize

    ENDPOINTS & SERVERS

    Discover hundreds of risky default settings & human errors

    ACTIVE DIRECTORY

    Detect misconfigurations & Real time Attacks on your AD / AAD

    AUTOMATIC REMEDIATION

    Rapid, automatic with zero impact

    Use case #1

    SMB v1 is a protocol that is extremely vulnerable and full of known exploits. Customers struggle to close it completely. Why?
    < / >
    All versions of Windows PCs and Servers
    It is enabled by default on all versions of Windows PCs and Servers. The method to disable it is different depending on the version of Windows (e.g. you cannot use GPO on Windows 10/11 to disable it).
    –
    Difficult
    Difficult to get visibility of whether it is in fact disabled on every endpoint and server. Difficult to know before disabling it whether it will impact an existing application that is using it.
    +
    GYTPOL Solution
    GYTPOL continuously monitors all devices and will detect when SMB v1 is enabled. GYTPOL can remediate and disable SMB v1 for all devices at a touch of a button. GYTPOL can detect in advance is disabling with impact existing applications. GYTPOL can automatically remediate, meaning if new devices added have. SMB v1 enabled then they will be automatically disabled.

    Use case #2

    Print Nightmare is a critical vulnerability that hackers exploit. Today, there is no patch available to fix it. The recommended remedy is to disable the Printer Spooler Service on all devices, especially servers. This is a big challenge to customers.
    < / >
    Print Spooler
    Print Spooler service is enabled by default on all versions of Windows PCs and Servers and will also start automatically on a boot-up of the device. Getting visibility of whether it is in fact disabled on your devices.
    –
    Difficult
    Difficult to know whether the device is used for Printing, hence you don’t want to disable these devices.
    +
    GYTPOL Solution
    GYTPOL continuously monitors all devices and will detect when Print Spooler is enabled. GYTPOL can remediate and disable for all devices at a touch of a button. GYTPOL can remediate without impact by detecting in advance if the device is actually used for printing. GYTPOL can automatically remediate, meaning if new devices added this enabled then they will be automatically disabled.

    Use case #3

    Log4Shell is a critical vulnerability found in the Log4J utility which is widely used in most 3rd party applications.
    < / >
    All occurrences of Log4J instances
    Detection of all occurrences of Log4J instances on all devices is non-trivial and many of the popular detection scanners available are not 100% accurate. This leaves customers exposed and not aware of it.3rd Party Applications need to provide an update to fix this, and some legacy applications might never provide a patch. Patching and updating is slow, timing consuming, and costly to organizations. They prefer not to.
    +
    GYTPOL Solution
    GYTPOL is proven to detect 100% of all vulnerable Log4J instances on all devices. GYTPOL can remediate this issue without the need of 3rd party updates or patching. GYTPOL can automatically remediate, meaning if new devices added are vulnerable then they will be automatically disabled.

    CONSULTATION

    REQUEST DEMO

    Request a consultation or demonstration, try Gytpol now.

    ABOUT US

    about us

    Softprom is a leading IT Distributor in Eastern & Central Europe, and the CIS with a portfolio of more than one hundred vendors. The company was founded in 1999 and nowadays it is represented territory in more than 30 countries. Softprom provides professional testing, training, installation, implementation, and technical support services in directions: Cyber Security, Cloud, IT Infrastructure, Video Security, CAD & Graphics. More information: softprom.com

    CONTACTS

    SOFTPROM Distribution Gmbh, Graben 19 — 1010 Vienna, Austria
    email: info@softprom.com | softprom.com

    NEWS

    Google
    image

    For the team, Google Workspace apps are like a chef's tried-and-true tools

    Unlock your team's potential with Google Workspace's suite of secure, online tools, to streamline...
    crm

    How to Launch Ads on LinkedIn and Facebook with HubSpot

    Bugcrowd

    Softprom News Jan 2024 - Top 10 Cyberattacks 2023

    crm

    Inbound Sales: How it works in HubSpot

    CybeReady

    Softprom News Nov 2023: Visibility as a Service, Living-off-the-land, and more...

    SoftpromLogoWhiteSmall

    Softprom © 2023 All rights reserved.