Cybergatekeeper Agent Software

  

Cyber. Gatekeeper Agent 7. Download cgav. exe. Find and compare Network Security software. Free, interactive tool to quickly narrow your choices and contact multiple vendors. Windows в CyberGatekeeper Agent 7. Audio Video software 1. CyberGatekeeper Agent on Software Informer. Showings_MainMenu_SubMenu-480x300.png' alt='Cybergatekeeper Agent Software' title='Cybergatekeeper Agent Software' />Cyber. Gatekeeper Server FAQ Network Access Control Solutions. General. Q What is Cyber. Gatekeeper Server A Cyber. Gatekeeper Server is a network access control appliance for LAN and remote access. It screens LAN, wireless LAN, and remote access endpoints before allowing access to the network. Cyber. Gatekeepers extensive tests ensure existing endpoint security solutions such as anti virus software, personal firewalls, operating system patches, and other software are properly configured and up to date. Guests can be validated, and rogues are isolated from the network. Unsafe systems are quarantined until remediated. Q What are the benefits of Cyber. Cybergatekeeper Agent Software' title='Cybergatekeeper Agent Software' />Gatekeeper Server A Cyber. Gatekeeper Server helps an organization in a number of ways Prevents worms, Trojans and viruses from infecting the network. Secures LAN, WLANs, and remote access points, and all types of users including employees and guests. Works with existing network infrastructure to eliminate costly upgrades, and allows the organization to implement needed security today. Scales easily with central management, reporting, and policy distribution. Underground Systems Reference Book here. Extensive and flexible remediation options let administrators control how much user involvement is required and bring systems quickly into compliance. Q. What are the key functions of Cyber. Cybergatekeeper Agent Software' title='Cybergatekeeper Agent Software' />Gatekeeper A Allow access only for endopints meeting key requirements, before and after admission to the network. These requirements are any combination of the following Authenticate, Assess scan and monitoring, Quarantine isolate, and Remediate resolve and update. Q. What is the Cyber. Gatekeeper relationship in regard to other endpoint solutions A Cyber. Gatekeeper collaborates and integrates with all existing endpoint security such as anti virus, personal firewalls, patch management, spyware, and intrusion detectionprevention systems, by knowing when one of these solutions needs updating. As soon as an endpoint is deemed non compliant, that system is immediately quarantined and blocked from further network access, and network administrators are alerted. No updates to existing software or security solutions are required for this integration to occur. Technical Network Architecture. Q What are the main functional components of the Cyber. Gatekeeper systemPolicy Enforcer New web agent prevents unsafe connections to intranets, with no enduser software or configuration required Mountain View, CA December 18. A There are three main components Cyber. Gatekeeper Server Hardware appliance used to conduct audits of endpoint systems. Client Installed or web based agent that runs on the endpoint systems. Policy Manager Creates and deploys policies. Q How does the user desktop audit process work A The agent is configured with specific conditions that tell it when to audit. For example, the agent can be configured to audit when it is on the corporate LAN. When the agent detects that it should initiate an audit session, it contacts the Cyber. Gatekeeper address. Cyber. Gatekeeper then sends the agent a grocery list of items to check on the endpoint system, based on required policies. This list can contain things such as running processesmodules, registry settings files attributes and configuration file settings. The agent collects the information on the list, and sends the results back to Cyber. Gatekeeper to compare with the policy. Cyber. Gatekeeper determines whether the endpoint system is in or out of compliance and manages access accordingly. Cyber. Gatekeeper may display an optional message or send a remediation action to bring them into compliance. Q. Does Cyber. Gatekeeper require other hardwaresoftware products A No, the Cyber. Gatekeeper solution works with the existing network environment and all third party software products. Moreover, a Cyber. Gatekeeper Agent has the ability to audit and inspect core features of the endpoint PC. No specific 3rd party application integration is required. Q What network resources are required to provide end user remediation A A web server to host the remediation files is recommended. For example, if you provide a patch as part of an auto remediation solution, that patch must be hosted on a web server that is accessible when the user has failed an audit. Q What are our options for redundancy or fault tolerance A The Cyber. Gatekeeper Server allows multiple appliances to be used in a failover scenario. If the active appliance becomes unavailable, the standby automatically becomes active and takes over tasks from the unavailable unit. This occurs in less than a minute and is generally seamless to the end user. Q What central management facilities are provided in Cyber. Gatekeeper A Policy Manager can develop, deploy and manage policies for any number of Cyber. Gatekeeper Servers. Policies can be grouped together into export sets, which allow rapid deployment to multiple appliances in a single action. The appliances themselves are managed directly via telnet or SSH, but configuration changes at this level are rarely needed. Q Is Cyber. Gatekeeper secure A All communication and traffic between the Cyber. Gatekeeper Agent and Server is signed and encrypted to provide privacy and integrity. Cyber. Gatekeeper Server is normally placed within the corporate network behind the firewall or VPN gateway. Cyber. Gatekeeper Server is hardened and resistant to attack. Technical User Desktop. Q What endpoint platforms does the solution support A There are three types of auditing methods for the client 1 dissolvabale client audit, 2 an agent on the network device, and 3 white list of the device ID for network devices that cannot run the agent. The agents providing full functionality run on Windows 2. XP, 2. 00. 3, and Vista. The MACOSX and Linux agents support in line NAC, and will support Dynamic NAC 3. Q 2. 00. 7. Q How much CPU does the audit process takeA When idle or during a session, the Cyber. Gatekeeper agent takes up less than 2 of CPU time. When a new session is initiated, it uses more CPU, for a short period about 1 second. It then drops to the nominal idle usage. Q Can Cyber. Gatekeeper Server log to a central location Cyber. Gatekeeper Server logs to a central reporting server. Technical Policy Management. Q. What is Policy Manager A Policy Manager is a Windows based tool used to develop, deploy and manage policies that determine what to check for in endpoint devices and how to determine compliance. Policy Manager also builds custom agents that can be tailored to meet site specific requirements. Q How does the agent check if the PC is compliant with the policy A There are a variety of tests available that may be defined in the policy definition with Policy Manager. The available tests include Check process or file Used to check that a process is running or a file is present on the remote PC. Specific characteristics of the process or file such as datetime stamp, size, version and checksum may be analyzed. Check registry key Used to check for the absence, existence or value of a specific registry key. Check operating system Used to check for major and minor version of the operating system running on the remote PC. Includes checking for Service packs and updates. Check computer name Used to check the computer name setting in Windows. Check ini File Used to check the contents of a standard. Check network Used to check the TCPIP settings of the computer. Q Does the agent check for the version of virus scanner. What happens when you are in the process of updating your. A Yes, using the policy definition options described above, the virus scanner.