News - Elisity Cognitive Trust

GYTPOL and Elisity Unveil New Integration to Enhance Endpoint Security and Microsegmentation

Written by William Toll | Oct 28, 2024 5:08:16 PM

A leading microsegmentation platform adds intelligence and automation from endpoint configuration and management platform to power deeper, dynamic security policies.

New York, NY and San Jose, CA – Elisity, the pioneer in identity-based microsegmentation, and GYTPOL, the fast-growing endpoint configuration security management platform, today announced a new integration between the two platforms that enhance endpoint security and microsegmentation capabilities.

By connecting with GYTPOL, Elisity's IdentityGraph™ is enriched with critical endpoint data, including configurations, compliance statuses, and vulnerability information. This enables organizations to create more effective and granular least privilege access policies — ensuring that only authorized devices and users can access sensitive resources.

The integration provides mutual customers with the visibility and control they need to create automated, dynamic, zero-trust security policies for all endpoints that GYTPOL manages. Elisity’s platform extends dynamic policies to all users, workloads, and devices, including IT, IoT, OT, and IoMT.

"Many IT and Security teams have endpoints at risk due to a limited ability to apply continuous policy hygiene across all endpoints. Together, GYTPOL and Elisity are redefining how microsegmentation policies can have the context needed to intelligently manage changes in risk automatically," said James Winebrenner, Chief Executive Officer of Elisity.

"Secure endpoints are the backbone of enterprise productivity; Elisity’s platform ensures that least privilege access policies are dynamic and persist as devices join and leave networks," said GYTPOL co-Founder and CEO Tal Kollender.

Elisity and GYTPOL Integration: Key Benefits & Capabilities

  • Visibility of endpoints and their complex configuration states is a key component of security. By more granularly, dynamically, and immediately tracking these aspects, it becomes possible to rapidly adapt policies to meet the challenges of real-time misconfiguration and vulnerability risk, ensuring a stronger security posture.
  • Control The GYTPOL integration enables the enforcement of identity and context-based least privilege access policies, for East-West traffic, across the network.
  • Simple Implementation The integration is designed to be simple to implement and does not require any downtime or lost productivity.

Learn more and request a demo from GYTPOL and Elisity

Watch an introduction and demo of the integration
here.

Read the GYTPOL and Elisity Solution Brief here.

About GYTPOL

Founded in 2019, GYTPOL is a first-of-its-kind platform to help manage and harden endpoint configurations. GYTPOL detects and corrects misconfigurations that put connected devices at risk. The platform enables push-button remediation and reversion to secure any individual device or device group according to the relevant standards or controls.

About Elisity

Elisity is a leap forward in network segmentation architecture and is leading the enterprise effort to achieve Zero Trust maturity, proactively prevent security risks, and reduce network complexity. Designed to be implemented in days, without downtime, upon implementation, the platform rapidly discovers every device on an enterprise network and correlates comprehensive device insights into the Elisity IdentityGraph™. This empowers teams with the context needed to automate classification and apply dynamic security policies to any device wherever and whenever it appears on the network. These granular, identity-based microsegmentation security policies are managed in the cloud and enforced using your existing network switching infrastructure in real-time, even on ephemeral IT/IoT/OT devices. Founded in 2019, Elisity has a global employee footprint and a growing number of customers in the Fortune 500