Sunteți pe pagina 1din 3

!

SOLUTION)OVERVIEW)

VMWARE!TRUSTPOINT!
!

AT!A!GLANCE!
VMware!TrustPoint™!helps!security!and!IT!operations!teams!get!complete!endpoint!
visibility!and!control!to!secure!and!manage!endpoints!at!unparalleled!speed!and!
scalability.!!!

THE!CHALLENGE!
Traditional!systems!management!tools!designed!for!the!clientKserver!era!are!being!
transformed!by!mobile!device!management!technology!optimized!for!the!mobileKcloud!
era.!This!is!shifting!the!industry!away!from!tools!that!use!a!heavilyKweighted!imaging!
and!networkKcentric!management!approach!to!solutions!that!are!lightweight,!agile!and!
offer!instant!overKtheKair!push!notification.!Similarly,!the!endpoint!security!industry!is!
shifting!away!from!traditional!reactive,!slow!and!complex!antiKmalware!tools!to!holistic!
solutions!that!support!a!wide!range!of!devices!that!offer!rapid!detection!and!response!
to!modern!and!sophisticated!attacks.!These!endpoint!industry!shifts!are!leading!to!the!
world!of!endpoint!management!and!endpoint!security!converging!to!help!businesses!
streamline!and!improve!organizational!security.!!

THE!SOLUTION! !
VMware!TrustPoint!increases!security!hygiene!across!any!organization!by!quickly!
BENEFITS)) finding!unmanaged!assets,!identifying!unauthorized!software,!remediating!adKhoc!
! vulnerabilities!and!allows!security!and!IT!teams!to!directly!take!actions!necessary!to!
secure,!gain!control!and!bring!these!assets!back!into!compliance.!Stay!a!step!ahead!
• Increase!security!hygiene!with! of!modern!sophisticated!attacks!by!empowering!security!teams!with!a!broad!set!of!
complete!visibility,!threat!detection!
capabilities!to!track,!contain,!and!remediate!threats!and!vulnerabilities!across!every!
and!remediation!that!keeps!
endpoints!secure,!under!control,! endpoint!with!unparalleled!speed!and!scalability.!Discover!IT!assets,!gather!live!
and!in!compliance! software!and!hardware!data!to!help!create!global!asset!inventories,!gather!critical!
endpoint!data!to!quickly!scope!and!fix!outages,!and!reliably!push!changes!to!
• Discover!IT!assets,!gather!software,! endpoints!at!scale!with!confidence.!OutKofKtheKbox!integration!of!TrustPoint!and!
hardware,!and!endpoint!data!to!
AirWatch!further!enhances!securing!and!managing!mobile,!desktop!and!server!
quickly!scope!and!fix!outages,!and!
reliably!push!changes!to!endpoints! environments,!and!dynamically!drives!policy!configuration!changes!across!the!
at!scale!! organization!for!even!stronger!compliance!and!faster!threat!containment.!
!
• Secure!and!manage!mobile,! !
desktop!and!server!environments!
by!dynamically!driving!policy!
configuration!change!across!the!
organization!!

!
)

V M W A R E ! T R U S T P O I N T ! | ! 1!
!
!
!

VMWARE!TRUSTPOINT!
!

Modern)Approach)to)Endpoint)Security)&)Management))
Don’t!settle!for!the!tools!of!yesterday.!Instead,!get!instant!endpoint!visibility!and!control!to!make!better!decisions!and!take!faster!
actions!with!the!TrustPoint!Security!Platform:!
•! Ask!a!question!in!plain!English!
•! Retrieve!answers!in!seconds!
•! Take!actions!at!scale!
The!TrustPoint!communications!platform!can!be!extended!with:!
•! Purpose!built!product!modules!that!provide!new!capabilities!that!enable!agility!and!reduce!the!use!of!siloed!tools.!
•! AirWatch!to!extend!security!and!management!to!mobile!devices)
)
)
Unique)Architecture)Provides)Speed)and)Scale)
TrustPoint’s!linear!chaining!architecture!scales!to!
millions!of!endpoints!effortlessly!without!requiring!
ongoing!infrastructure!additions,!resulting!in!
dramatic!cost!savings.!Based!on!a!resilient! !!!!!!!!!!!!!!!!!!!!!!!! !
infrastructure,!it!is!designed!to!get!complete!
results!from!endpoints!on!the!network.!Only!
TrustPoint!can!provide!response!times!measured!
in!seconds!through!decentralized!data!
aggregation!and!distribution!primarily!across!lowK
latency!LAN!traffic!results.!
!
Discover)Unmanaged)Endpoints)in)Seconds))
Detect!hidden!unmanaged!assets!across!large!distributed!global!networks!at!unparalleled!speed,!unlike!timeKconsuming!
approaches!that!rely!on!full!network!scans!across!WAN!links.!TrustPoint!allows!Tanium!Clients!to!actively!monitor!and!scan!their!
local!subnets!for!unmanaged!assets!around!them!and!report!back!newly!discovered!ones.!This!unique!approach!provides!nearly!
continuous!scanning,!without!many!of!the!problems!related!to!centralized!scanners,!and!is!incredibly!lightweight!with!almost!no!
impact!on!the!WAN!or!on!the!device.!
!
Advanced)Threat)Detection)&)Remediation))
TrustPoint!delivers!a!broad!set!of!capabilities!to!track,!contain!and!remediate!threats!and!vulnerabilities!across!every!endpoint!with!
unparalleled!speed!and!scalability.!ReKestablish!full!control!and!stop!attacks!already!underway!in!just!seconds.!Quickly!remediate!
threats!at!scale!by!quarantining!machines,!killing!processes,!disabling!network!connections,!changing!registry!data,!uninstalling!
applications,!resetting!credentials,!and!shutting!down!systems.!If!all!other!remediation!attempts!have!failed!or!if!you!want!to!
transfer!ownership!of!a!device,!TrustPoint!can!reimage!Windows!endpoints!at!scale!back!to!your!golden!image.!!
!
Leading)Edge)Asset)Visibility))
Quickly!discover!IT!assets,!and!gather!live!endpoint!data!to!help!create!upKtoKdate!global!inventory!of!all!hardware!and!software!
assets.!!
•! Reduce!costs!with!live!software!asset!inventory!and!utilization!data!and!defend!against!vendor!audits,!and!reclaim!
expensive!unused!or!underused!software!licenses.!
•! Quickly!get!a!detailed!and!upKtoKdate!asset!inventory!from!employee!workstations!to!remote!data!center,!branch!location!
servers,!virtual!machines!or!assets!in!the!cloud.!Gather!attributes!such!as!name,!manufacturer,!model,!CPU,!MAC!
address,!RAM,!and!disk!space!details.!!
•! Enrich!existing!systems!by!integrating!TrustPoint!with!existing!management!tools,!including!CMDBs,!help!desks,!and!
asset!management!systems!for!better!decisionKmaking,!efficiency,!and!cost!savings.

V M W A R E ! T R U S T P O I N T ! | ! 2!
!
!

VMWARE!TRUSTPOINT!
!

!!!!!!!!!! !!!!
)
Unmatched)Efficiency)and)Accuracy)for)IT)Ops))
With!TrustPoint,!quickly!gather!critical!endpoint!data!to!scope!and!fix!outages,!reliably!push!patches!to!endpoints!at!scale!with!
confidence,!and!easily!distribute!software!and!endpoint!configurations.!!
•! Faster,!easier,!more!reliable!patching:!Successfully!deploy!patches!across!every!endpoint!with!unprecedented!speed!and!
reliability,!regardless!of!the!size!of!the!environment.!Define!custom!workflows!and!schedule!patches!based!on!advanced!
rules!or!exceptions,!including!whitelists,!blacklists,!dynamic!computer!groups,!and!patch!lists.!
•! Incident/problem!scoping!and!remediation!with!live!and!recorded!endpoint!data:!Directly!access!comprehensive!endpoint!
data!from!all!systems!in!an!environment!within!seconds!to!greatly!accelerate!the!time!required!to!triage!complex!
incidents.!Use!live!and!recorded!endpoint!data!(such!as!file!system,!process,!network!connections,!and!registry)!for!
detailed!lookKbacks!and!root!cause!analysis.!Once!the!issue!has!been!fully!scoped,!execute!remediation!swiftly!and!
precisely.!
•! Distribute!software!and!endpoint!configurations:!Distribute,!update,!or!uninstall!software!packages!confidently!to!any!or!
every!desired!endpoint,!and!confirm!successful!completion!seconds!later.!TrustPoint’s!communications!architecture!
delivers!software!across!the!network!at!unprecedented!speeds!by!drastically!reducing!reliance!on!expensive!WAN!traffic.!
!

!
)
Adaptive)Architecture)for)Unified)Endpoint)Management)and)Endpoint)Security)
TrustPoint!can!complement!an!AirWatch!deployment!to!further!enhance!securing!and!managing!just!about!any!endpoint!from!
mobile!to!desktop!and!servers.!Unifying!AirWatch!and!TrustPoint!drives!dynamic!policy!configuration!changes!across!the!
organization!for!even!stronger!compliance!and!faster!threat!containment!K!creating!a!new!standard!for!secure!computing!
environments.!Here!are!some!of!the!key!benefits:!
•! Programmatically!identify!endpoints!that!are!out!of!compliance!or!have!a!security!vulnerability,!and!inform!AirWatch!to!
take!action.!
•! AirWatch!can!then!better!scope!the!incident!and!take!the!appropriate!action!to!minimize!exposure!to!other!endpoints!on!
the!network!while!informing!outKofKcompliance!users!via!email!of!the!security!breach!or!outKofKcompliance!posture.!
•! Customize!responses!based!on!the!severity!of!the!threat.!For!example:!Low!risk!postures!could!be!flagged!as!outKofK
compliance!and!notified!by!email.!Medium!risk!postures!could!result!in!being!quarantined!on!top!of!that.!High!risk!
postures!could!result!in!devices!getting!completely!wiped.!
By!integrating!the!speed!and!scale!of!TrustPoint’s!communications!platform!with!VMware!AirWatch,!users!get!access!to!a!powerful!
and!modern!way!of!securing!and!managing!mobile!devices,!computers!and!servers!all!from!a!single!vendor.!
)
LEARN)MORE)
For!more!information,!visit!http://www.vmware.com/products/trustpoint/!!

)
VMware,)Inc.)3401)Hillview)Avenue)Palo)Alto)CA)94304)USA)Tel)877U486U9273)Fax)650U427U5001)www.vmware.com)
Copyright!©!2016!VMware,!Inc.!All!rights!reserved.!This!product!is!protected!by!U.S.!and!international!copyright!and!intellectual!property!laws.!VMware!products!are!covered!by!one!or!more!
patents!listed!at!http://www.vmware.com/go/patents.!VMware!is!a!registered!trademark!or!trademark!of!VMware,!Inc.!in!the!United!States!and/or!other!jurisdictions.!All!other!marks!and!names!
mentioned!herein!may!be!trademarks!of!their!respective!companies.!!

S-ar putea să vă placă și