Policies are only words on paper, until they're put into action.
The Enforcement Appliance is designed to execute your policies, checking to make sure a device is updated to your organization's baseline requirement before it is allowed on the network. Sitting inline with your users, the enforcement appliance monitors every packet crossing your network.
The Enforcement Appliance has an unprecedented level of customization. When connecting to your network, the Edgewall determines who is connecting, from what device, is this an allowed period of time, where the device attached to the network, and how. The EdgeWall doesn’t leave anything to chance.
The EdgeWall Enforcement Appliance also support high availability for your network. When paired with a second Enforcement Appliance and switches capable of utilizing spanning tree, a single failure on your network improves your reliability.
The Endpoint Detective is an optional agent that can either be downloaded from the EdgeWall systems from a hosted page, and can be run without an administrative privileges. These dissolvable agents provide an opportunity to check the health on new or strange devices.
One challenge with Bring-Your-Own-Device (BYOD) environments has been the ability to enforce security policies on devices your company has no control over. Endpoint Detective helps break down these challenges. Endpoint Detective comes preconfigured to accept instructions from the enforcement appliances on your specific security policies. As soon as health is established and access is granted, the agent can simply be moved to the trash or left for future use. Your security policies are never stored on the endpoint ensuring criteria remains secure.