Our first step in deploying this solution was to identify assets and install agents. One can click to see agent jobs. This was where we selected the modules to add or remove. Agent downloads were done by selecting the OS and version. Agent policies were selected and recurring scan policy set. The Directory Service Group was selected (other systems were selected by custom groups). Verification that the agent was enabled was presented. We then ran through the functions and features, such as the application control policies.
There are several foundational components: Patch and Remediation, reduces organizational risk and optimizes IT operations through the timely, proactive elimination of operating system and application vulnerabilities across all endpoints and servers. The tool supports multiple platforms (e.g., Windows, xNIX, OS X) and third-party applications (e.g., Adobe, Apple, Java). Security Configuration Management ensures that endpoints are securely configured and in compliance with industry best practices and regulatory mandates while reducing configuration drift. Power Management reduces endpoint power consumption costs of both online and offline endpoints. Content Wizard delivers customized extensibility through wizard-driven and custom scripting tools to take any action on endpoints, including deploying and removing software, remediating configurations, performing systems management tasks and delivering custom patches. Reporting Services provides integrated, preconfigured and centralized business intelligence which can be customized to meet organizational needs. Application Control defines and enforces trusted application use through whitelist policies to ensure only applications explicitly authorized or trusted are allowed to execute. Advanced Memory Protection defends against sophisticated memory injection attacks, and Antivirus provides blacklist protection and removal of all malware, including viruses, worms, spyware, trojans and adware. Device Control enforces usage policies for devices and ports while providing data encryption for removable media to prevent data loss/theft. And, Disk Encryption reduces risks and costs of a data breach when a workstation is lost or stolen via easy-to-use full disk encryption.
Lumension provided an array of documents for installing, configuring and using the features within the product. Installation was performed by downloading executable files. For a product that is loaded with high-value features, the system is very easy to operate. The dashboard is well laid out with all of the toolbars, status panels and graphs one would expect.
The value for the money for this product is very good.
Very well done. We designate this our Recommended product.