Defeats All Adversaries
Integrated MFA defeats credential theft of both passwords and NTLM tokens.
Trust assessment blocks access to enterprise apps from compromised PCs.
Server isolation defeats server exploitation and lateral movement.
Mutually authenticated app-layer tunnels defeat man-in-the-middle attacks.
Transparent User Experience
No phone to respond to. No token to enter. It defeats credential theft and it is transparent to the user.
Sleep a computer. Wake it up, and it’s connected – after another round of transparent MFA.
Total Client Visibility
Apps, Users, Devices
See which users on which devices are accessing which applications at what time and from where.
Gain visibility and discover software vulnerabilities, malware, and compromised endpoints.
Architecture that Defeats All Adversaries
Vidder’s Trust Assessment extends well beyond posture checking with unprecedented threat and vulnerability assessment, visibility and reporting
- Managed / unmanaged
- OS, critical apps patched
- AV running & up to date
- Apps to users to devices
- Threats / risk
- Detailed drill downs
- CVSS of every CVE, all devices
- Configuration best practices
- Risk of open ports
Alerts & Reports
- Customer defined
- Throttling options
- No language to learn
- Device behavior (Mitre Att&ck matrix)
- Threat intel (known bad IPs)
- Malware verification
- Non-intrusive to PC
- Protect enterprise apps
- Defeats compromised PC
Integrated, Intuitive and Insightful Visibility
Vidder Service Provides
- Automated deployment
- Continuous monitoring, 24/7 support
- Per customer optimization
- No hardware, managed service
- Tiered pricing
- Accelerated time to value
- Minimal expertise required
- Maximized security, performance
- No CapEx