- 29 Oct 2024
- 2 Minutes to read
- Print
- PDF
Introduction
- Updated on 29 Oct 2024
- 2 Minutes to read
- Print
- PDF
Scalefusion Veltar is a comprehensive Endpoint Security Solution that lets you experience the power of unified endpoint security. It offers a robust suite of tools designed to safeguard your managed devices' data both at rest and in motion. Key features include:
Third-Party Integrations: Seamlessly integrate with essential security tools for enhanced protection.
Application and I/O Controls: Manage application access and control I/O device usage.
Secure Web Gateway: Filter and protect web traffic to prevent unauthorized access and data breaches.
On-Premise VPN: Establish secure connections to your on-premises infrastructure.
By centralizing security management from a single console, you can streamline your operations and strengthen your organization's defenses.
Offerings under Veltar
Essential Integrations: Scalefusion offers seamless integration with leading security solutions, enabling organizations to leverage their existing investments and enhance their overall security posture. Current Integration:
Checkpoint: Scalefusion is integrated with Checkpoint, a leading network security provider. This integration allows for enhanced security and streamlined management of your devices.
Application Control: Veltar's Application Control for macOS leverages Apple's Endpoint Security framework to provide granular control over application access on your managed macOS devices. IT administrators can block or allow applications based on various criteria, ensuring compliance and security. Key Features:
Application Blocking and Allowing: Control which applications can be run on macOS devices.
Flexible Criteria: Block or allow applications based on Team ID, Bundle ID, Signing Certificate, or Application File Hash.
Additional Settings: Configure blocking behavior (silent or with a message) and apply restrictions to specific users or devices.
Conditional Access: Implement conditional blocking based on day/time and device IP address.
Detailed Logging: View analytics and detailed logs of blocked app accesses.
I/O Device Access Control: Veltar's I/O Device Access Control provides robust protection for your managed devices by controlling access to USB devices. IT administrators can define granular rules to prevent data leaks and ensure data security. Key Features:
Global Access Mode: Set a global access mode for USB devices (Read/Write, Read Only, Block).
Per-Device Rules: Define specific rules for individual USB devices based on Vendor ID, Product ID, or Serial Number.
Granular Access Control: Choose between Read/Write, Read Only, or Block access levels for each device.
Encryption Enforcement: Ensure that devices can only be accessed if they are encrypted.
iOS/iPadOS Integration: Configure policies for iPhone and iPad connections to macOS devices.
Secure Web Gateway: Veltar's Secure Web Gateway (SWG) provides comprehensive protection for your managed devices by filtering and controlling web traffic. IT administrators can define various rules to ensure safe and compliant browsing experiences. Key Features:
Category-Based Blocklists: Easily block websites based on predefined categories (e.g., social media, gaming, adult content).
Customizable Blocklists: Create custom blocklists to target specific websites or domains.
Allowlist Overrides: Prioritize allowed websites over blocked ones, granting access to essential resources.
Cross-Platform Compatibility: SWG works seamlessly across Android (coming soon) and iOS devices, ensuring consistent protection regardless of the operating system.
Virtual Private Network (VPN): Veltar's VPN solution provides a secure and reliable way for managed devices to access network resources behind a firewall. Powered by Wireguard, our VPN offers a seamless deployment and management experience for IT administrators. Key Features:
On-Premises Deployment: Deploy the Veltar VPN server software on your own infrastructure.
Centralized Management: Configure VPN tunnels and deploy them to managed devices directly from the Scalefusion console.
Automated Deployment: The system handles the creation of tunnels, user configuration, and deployment to ensure seamless access.
Secure Access: Restrict access to network resources to only managed devices, enhancing security.
The next set of documents contain detailed description on how you can configure and make use of all the above features.