Automated devices
are becoming widespread in every field. Among the variety of options
of data computation and transfer provided by such devices, there are
serious security concerns including malware attacks and data leaks
that need to be addressed. The existing solutions for permission and
device control do not provide granular and centralised control that
can efficiently manage, secure, and safeguard your system.
viGOps™ enables safe system utilisation across connected
hosts. By
combining key features of Device and Permission Control with
prestructured Group Policies, viGOps™ blocks unintended OS
commands
and provides USB device blacklisting / whitelisting abilities via
their attributes. Thus, preventing the spread of malicious
adversaries.
By controlling functionalities from a centralised command and
control server, viGOps™ enables a hassle-free user experience
for
securing your enterprise reliably.
Group Policy
viGOps™ EDR solution provides easy and secure group policy
enforcement by maintaining a group database with features to
activate and deactivate groups on the go.
Device Control
Device Control blocks specific hardware devices to protect your
enterprise network from being exposed to imminent threats by
implementing device authorisation policies based on their
attributes.
Permission Control
Generates system administration rules by blocking root login,
terminal emulators, and unintended OS commands on the Linux host
through the C2 server from external devices such as USB storage
devices.
Manage control policies by logging hosts
with the required groups.
Statistics Tab to provide visualisation
capabilities, time-series analytics and
application monitoring.
Device Control
With an initialisation policy to block
all new USB devices post-installation,
viGOps™ offers provisions to
perform
device blacklisting / whitelisting
through the centralised Command and
Control(C2) server.
Built on top of widely used USBGuard.
Centralised database to register trusted
USB devices in an enterprise.
Device query and alert feature on a
per-host basis.
Permission Control
Rules can be applied individually or as
a group by selecting the active hosts
from the client list.
Permission control logs to view
previously used actions for any host.
Experience
the features that make our product the best for all the businesses
out there.