SECURITY CONFIGURATION MANAGEMENT PLATFORM
Gytpol — visibility of security gaps with Automatic Remediation
Full visibility. Continuously monitoring all devices, even remote ones. Detects risks due to non-compliance and misconfigurations.
Remediates. It’s fast, automatic, shows the potential impact and you can roll back. End to End coverage: Devices, Service infrastructure, and Cloud.
Advanced compliance CIS, Microsoft Security Baseline, MITRE ATT&CK Framework. Achieve a higher level of compliance with GYTPOL intelligence coverage.
What is Gytpol Validator?
GYTPOL Validator is providing a unique view of your misconfiguration security gaps with continuous monitoring of all your devices. Remove risks with rapid and automatic remediation with zero impact to existing business operations...
REQUEST DEMO
DASHBOARD
Executive view of the most important and critical issues to prioritize
ENDPOINTS & SERVERS
Discover hundreds of risky default settings & human errors
ACTIVE DIRECTORY
Detect misconfigurations & Real time Attacks on your AD / AAD
AUTOMATIC REMEDIATION
Rapid, automatic with zero impact
Use case #1
SMB v1 is a protocol that is extremely vulnerable and full of known exploits. Customers struggle to close it completely. Why?
< / >
All versions of Windows PCs and Servers
It is enabled by default on all versions of Windows PCs and Servers. The method to disable it is different depending on the version of Windows (e.g. you cannot use GPO on Windows 10/11 to disable it).
–
Difficult
Difficult to get visibility of whether it is in fact disabled on every endpoint and server. Difficult to know before disabling it whether it will impact an existing application that is using it.
+
GYTPOL Solution
GYTPOL continuously monitors all devices and will detect when SMB v1 is enabled. GYTPOL can remediate and disable SMB v1 for all devices at a touch of a button. GYTPOL can detect in advance is disabling with impact existing applications. GYTPOL can automatically remediate, meaning if new devices added have. SMB v1 enabled then they will be automatically disabled.
Use case #2
Print Nightmare is a critical vulnerability that hackers exploit. Today, there is no patch available to fix it. The recommended remedy is to disable the Printer Spooler Service on all devices, especially servers. This is a big challenge to customers.
< / >
Print Spooler
Print Spooler service is enabled by default on all versions of Windows PCs and Servers and will also start automatically on a boot-up of the device. Getting visibility of whether it is in fact disabled on your devices.
–
Difficult
Difficult to know whether the device is used for Printing, hence you don’t want to disable these devices.
+
GYTPOL Solution
GYTPOL continuously monitors all devices and will detect when Print Spooler is enabled. GYTPOL can remediate and disable for all devices at a touch of a button. GYTPOL can remediate without impact by detecting in advance if the device is actually used for printing. GYTPOL can automatically remediate, meaning if new devices added this enabled then they will be automatically disabled.
Use case #3
Log4Shell is a critical vulnerability found in the Log4J utility which is widely used in most 3rd party applications.
< / >
All occurrences of Log4J instances
Detection of all occurrences of Log4J instances on all devices is non-trivial and many of the popular detection scanners available are not 100% accurate. This leaves customers exposed and not aware of it.3rd Party Applications need to provide an update to fix this, and some legacy applications might never provide a patch. Patching and updating is slow, timing consuming, and costly to organizations. They prefer not to.
+
GYTPOL Solution
GYTPOL is proven to detect 100% of all vulnerable Log4J instances on all devices. GYTPOL can remediate this issue without the need of 3rd party updates or patching. GYTPOL can automatically remediate, meaning if new devices added are vulnerable then they will be automatically disabled.
REQUEST DEMO
Request a consultation or demonstration, try Gytpol now.
about us
Softprom is a leading IT Distributor in Eastern & Central Europe, and the CIS with a portfolio of more than one hundred vendors. The company was founded in 1999 and nowadays it is represented territory in more than 30 countries. Softprom provides professional testing, training, installation, implementation, and technical support services in directions: Cyber Security, Cloud, IT Infrastructure, Video Security, CAD & Graphics. More information: softprom.com
NEWS
Unlock your team's potential with Google Workspace's suite of secure, online tools, to streamline...