IDENTITY CLIENT

The “endpoint” is worth its weight in gold for any hacker because we are surrounded by end devices. The number of networked devices is in the billions and rising, but some of them are outdated and dependent on the user's operation. 88% of all data breaches are caused by human error. If companies do not ensure that every device that is given access to internal resources also complies with security guidelines, there can be no better gateway. IDENTITY is THE platform for all identities. With IDENTITY CLIENT, we are now further hardening the solution and enabling REAL Zero Trust Identity.

ISL Internet Sicherheitslösungen GmbH
+49 234 976672-0 Contact

What is the “client” for our identity?

The Identity Client is not a stand-alone solution, but is directly linked to the Identity IAM. It makes it possible not only to identify and authenticate the user
and authenticate the user, but also to include the associated device and its status as an important factor. At the same time, we can extend the features of Identity to clients. This gives our self-developed Identity & Access Management greater leverage for implementing a zero-trust strategy. To ensure that the latest version is always available, the solution is offered exclusively “as a service”. This means that the Identity Client can be used without any internal effort and without having to worry about hosting. Of course, the entire solution is only provided from our German, certified data centers.

What are the advantages of using the Identity Client?

1
Transparency

Visibility of all devices in the network - status of devices can be viewed at the click of a button - overview of how many and when devices access company apps

2
Rulemaking

Setting up individual or universal endpoint & MFA policies - Compliance policies are set centrally in IDENTITY using our conditional access feature - Use case: According to the compliance policy, only secure devices should be able to access company apps. The devices require an up-to-date version of the operating system and the necessary security, e.g. an active firewall and/or antivirus status. Access to (important) applications is only possible once this has been ensured.

3
Enforcement of regulations and audit & logs

Tracking & allocation of compliance guidelines - Transparency of logs allows you to see directly which clients are/were active in which form and why - Good for audits & compliance documentation

4
Combination of network, device & identity security

Optimum linking of network security, the respective devices & identities - Identity: Login, MFA & conditional access (policy enforcement) - Identity Client: Visibility of the device & the respective device status - ARP-GUARD NAC: Network security

Would you like to become a sales partner? 

ISL Internet Sicherheitslösungen GmbH
operations@isl.de+49 234 976672-0
Contact
Service area
Newsletter

Contact

Service area

ARP-GUARD service area

If you are already an ARP-GUARD partner, you can access your personal service area here.

Get the latest releases and up-to-date knowledgebase articles and manage your ARP-GUARD.

Partner login

Become an ARP-GUARD partner now!

Would you like to make the most of the advantages of our solution and complete your “Network Security” portfolio? 

Then you have the opportunity to become an ARP-GUARD partner!

Become a partner

Newsletter

We inform you about current topics, such as events and new product features.

Keep up-to-date at all times!

ARP-GUARD newsletter

Register Now!