Combined offering powers both automation and deeper, more dynamic security policies.
Elisity, the pioneer in identity-based microsegmentation, and GYTPOL, the leading endpoint configuration security platform, today announced an integration between the two platforms that enhances endpoint security and microsegmentation capabilities.
Also Read: Protecting APIs at the Edge
By connecting with GYTPOL, Elisity’s IdentityGraph is enriched with critical endpoint data, including configurations, compliance statuses, and vulnerability information. This enables organizations to create more effective and granular least privilege access policies — ensuring that only authorized devices and users can access sensitive resources.
The integration provides mutual customers with the visibility and control they need to create automated, dynamic, zero-trust security policies for all endpoints that GYTPOL manages. Elisity’s platform extends dynamic policies to all users, workloads, and devices, including IT, IoT, OT, and IoMT.
“Many IT and Security teams have endpoints at risk due to a limited ability to apply continuous policy hygiene across all endpoints. Together, GYTPOL and Elisity are redefining how microsegmentation policies can have the context needed to intelligently manage changes in risk automatically,” said James Winebrenner, Chief Executive Officer of Elisity.
Also Read: A Comprehensive Guide to DDoS Protection Strategies for Modern Enterprises
“Secure endpoints are the backbone of enterprise productivity; Elisity’s platform ensures that least privilege access policies security policies are dynamic and persist as devices join and leave networks,” said GYTPOL co-Founder and CEO Tal Kollender.
𝗘𝗹𝗶𝘀𝗶𝘁𝘆 𝗮𝗻𝗱 𝗚𝗬𝗧𝗣𝗢𝗟 𝗜𝗻𝘁𝗲𝗴𝗿𝗮𝘁𝗶𝗼𝗻 — 𝗞𝗲𝘆 𝗕𝗲𝗻𝗲𝗳𝗶𝘁𝘀 & 𝗖𝗮𝗽𝗮𝗯𝗶𝗹𝗶𝘁𝗶𝗲𝘀
𝗩𝗶𝘀𝗶𝗯𝗶𝗹𝗶𝘁𝘆 of endpoints and their complex configuration states is a key component of security.
↳By more granularly, dynamically, and immediately tracking these aspects, it becomes possible to rapidly adapt policies to meet the challenges of real-time misconfiguration and vulnerability risk, ensuring a stronger security posture.
𝗖𝗼𝗻𝘁𝗿𝗼𝗹.
↳The GYTPOL integration enables the enforcement of identity and context-based least privilege access policies, for East-West traffic, across the network.
𝗦𝗶𝗺𝗽𝗹𝗲 𝗜𝗺𝗽𝗹𝗲𝗺𝗲𝗻𝘁𝗮𝘁𝗶𝗼𝗻.
↳The integration is designed to be simple to implement and does not require any downtime or lost productivity.
[To share your insights with us as part of editorial or sponsored content, please write to psen@itechseries.com]