viGOps™

Endpoint Detection & Response

Automated devices are becoming widespread in every field. Among the variety of options of data computation and transfer provided by such devices, there are serious security concerns including malware attacks and data leaks that need to be addressed. The existing solutions for permission and device control do not provide granular and centralised control that can efficiently manage, secure, and safeguard your system.

viGOps™ enables safe system utilisation across connected hosts. By combining key features of Device and Permission Control with prestructured Group Policies, viGOps™ blocks unintended OS commands and provides USB device blacklisting / whitelisting abilities via their attributes. Thus, preventing the spread of malicious adversaries.

By controlling functionalities from a centralised command and control server, viGOps™ enables a hassle-free user experience for securing your enterprise reliably.

Group Policy

viGOps™ EDR solution provides easy and secure group policy enforcement by maintaining a group database with features to activate and deactivate groups on the go.

Device Control

Device Control blocks specific hardware devices to protect your enterprise network from being exposed to imminent threats by implementing device authorisation policies based on their attributes.

Permission Control

Generates system administration rules by blocking root login, terminal emulators, and unintended OS commands on the Linux host through the C2 server from external devices such as USB storage devices.

SEDOS

Smart Enterprise Device Orchestration Solution

generate report

Group Policy

  • Manage control policies by logging hosts with the required groups.
  • Statistics Tab to provide visualisation capabilities, time-series analytics and application monitoring.
  • generate report

    Device Control

  • With an initialisation policy to block all new USB devices post-installation, viGOps™ offers provisions to perform device blacklisting / whitelisting through the centralised Command and Control(C2) server.
  • Built on top of widely used USBGuard.
  • Centralised database to register trusted USB devices in an enterprise.
  • Device query and alert feature on a per-host basis.
  • generate report

    Permission Control

  • Rules can be applied individually or as a group by selecting the active hosts from the client list.
  • Permission control logs to view previously used actions for any host.
  • Experience the features that make our product the best for all the businesses out there.