Updated Policy Commander 2.0 Automates Windows Security Compliance

Removes windows vulnerabilities, creates self-correcting security compliance environment

New Boundary Technologies has released Policy Commander 2.0 that helps make Windows systems safer and improves their compliance.

The company says that recent research points to company threats to its IT infrastructure and confidential information originating from inside the organization itself., rather than external sources like hackers. Organizations are much more likely to experience security breaches initiated by employees, either through malicious activity or simple user errors. And the risk of data breaches from external sources increase significantly for off-network equipment like laptops because they lose the protection of network perimeter defenses.

“Policy Commander 2.0 is impressive as a competitive compliance solution for the mid-market,” said Richard Ptak, managing partner and co-founder of Ptak, Noel & Associates LLC, in a statement.

Focusing IT resources on perimeter defenses instead of system-level security configuration exposes organizations to internal threats, and the increase in mobile devices leaves enterprises exposed to external security threats. IT must also deal with security compliance measures such as HIPAA, GLBA, and PCI.

Policy Commander 2.0 helps IT professionals automate the lockdown of Windows systems to improve security while minimizing the impact to IT resources. Lockdown is maintained continuously. Policy Commander 2.0 features include:

  • Configuration groups that automate administration of individual systems and groups of computers based on any configuration trait

  • Offline enforcement of policies protects Windows systems from security threats off the network

  • Administrators can maintain audit trails and get real-time compliance insight; they can also document security compliance

  • A security policy knowledge base, drag-and-drop policy assignment, and an integrated policy editor enhance policy management

  • Security roles allow administrators to delegate authority based on permission levels

More information is available at http://www.newboundary.com.

Must Read Articles