Promisec Rolls Out Endpoint CompliancePromisec Rolls Out Endpoint Compliance
Promisec unveils endpoint compliance and governance solution
October 17, 2007

NEW YORK -- Promisec Inc., a technology leader in internal network security management, today announced comprehensive endpoint compliance and governance for the distributed enterprise - Promisec InnerSpace™. With InnerSpace, organizations now benefit from greater ease-of-use, management and effectiveness of their network security infrastructure from a centralized location to gain complete visibility and control and enforce corporate and regulatory compliance.
“Getting network security right, especially in a distributed enterprise environment is no simple task as it has the potential to impact hundreds of existing hardware and software operations that require centralized management to address complications, said Jon Oltsik, security analyst for Enterprise Strategy Group “Promisec seeks to address this by presenting single-pane management of network security throughout the enterprise, thereby hardening the endpoint which is coincidentally the favored target of viruses, worms, Trojan horses, and unauthorized processes that target corporate information and computers. For organizations with the intimidating challenge of securing large networks, companies like Promisec promise to simplify the process.”
Promisec InnerSpace delivers unsurpassed protection and scalability, and is the only solution based on Clientless Endpoint Security Management (CESM) technology with continuous endpoint monitoring, automatically enforcing security policies, and offering problem remediation without the need for clients installed on the systems being inspected. Promisec technology identifies threats and deviations from corporate policy and resolves them before they become serious security issues. Promisec Ltd.
About the Author(s)
Tricks to Boost Your Threat Hunting Game
Nov 06, 2023Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods
Oct 26, 2023Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven
Nov 06, 2023How to Combat the Latest Cloud Security Threats
Nov 06, 2023Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023