Why Deploying enSilo is Much Easier than Other Endpoint Security Solutions

One of the many facets in managing security tools is the deployment process. In an ideal world, deployment and installation would be straightforward and easy, but we often hear from IT Security teams how unhappy they are with their current tools. Imagine you’ve invested time, money (lots of money) and effort for a proof of concept (POC) with multiple endpoint security vendors and perhaps even hired additional staff to deploy the tool and train employees, thinking you’ve done all the right things -- and then your deployment goes nowhere. Sound familiar? You’re not alone.

For example, a recent article in the Wall Street Journal pointed out the travails of CapitalOne as they sought to install an endpoint security vendor: “Routine cybersecurity measures to help protect the company sometimes fell by the wayside, some of the people said. For instance, the bank around late 2017 bought software... to improve its ability to detect hacks, some of the people said. More than a year after buying the software, Capital One still hadn’t finished installing it, one of the people said.” (An article in Gizmodo has additional details.)

That doesn’t happen with enSilo customers. Because our agent, known as the enSilo Collector, is super lightweight and adaptive by design, it’s typically a breeze to deploy. Here are the pertinent details:

The enSilo Collector retains only a limited amount of metadata on the device in order to keep CPU usage to virtually zero and the storage requirements to a minimum. enSilo’s traffic consumption requirements are also low since enSilo only processes the initial connection establishment.

The enSilo Collector is a single lightweight agent and comes as a standard installer package for each supported OS, and is easily installed via standard remote unattended deployment tools, such as Microsoft SCCM. No local configuration or reboot is required; however, a reboot of the system ensures that any malicious connections that were previously established before the installation are thwarted and tracked via enSilo after the reboot is complete. Upgrades can be performed remotely and are rarely needed, because all the brains of the enSilo system are in the enSilo Core (our optional security policy enforcer). enSilo provides broad support for many OSes.

Deployment Options

Customers have a choice of whether they want to protect on-premise, off-premise, or both:

  • Protect On-Premise: Protects all the communicating devices when they reside in your organization’s network. The enSilo Collector communicates with the enSilo On-Premise Core.
  • ProtectAnyWhere®: Protects all the communicating devices when they reside outside of your organization’s network. The enSilo Collector communicates with the enSilo cloud Core, hosted by enSilo. This option can be used when employees take their communicating device (such as a laptop) outside the organization’s network (for example, home).
  • Combining On-Premise protection with ProtectAnyWhere® means that full protection against targeted attacks is applied both inside your organization and outside.

If you are deploying in the cloud, it takes less than a day to get set up and running, and we do all the work for you. If you are deploying on-premise, you will need to spin up the enSilo components on your own servers, but we outline all the steps in our Installation and Administration Guide and can help you along the way. Either way, we recommend you test in a staging environment so you can simulate what will happen once you go live. Once your architecture is built, deployment is essentially ready to go. As a best practice, we always recommend deploying to staging and/or test environments to start, so that you are comfortable by the time we get to production machines. Doing it this way won’t impact your production machines or complicate users’ lives, and also ensures that any potential issues are identified early in the deployment phase. If you feel you’d like some extra help, enSilo Professional Services are available to assess your environment and partner with you to create a highly personalized implementation plan, so you don’t have to worry about going it alone.

Here’s what some of our customers say about the ease of deployment with enSilo on Gartner Peer Insights:

“The enSilo EndPoint Security product is extremely easy to install and manage…. We have deployed the product across both Servers and Workstations with relative ease and it was basically a non-event to the end user.“ -- CISO, Finance, $3-$10B USD

“For our desktop team, they had the most smooth deployment, compared to all other vendors we conducted PoCs.” -- Sr. Security Engineer, Education, Less than 5,000 employees

“The deployment was easy and users did not notice we deployed a new product out.” -- Director - Enterprise Dev/Ops, Manufacturing, $250M-$500M USD

“Quite impressed with the ease of use and speed of deployment.” -- Security and Risk Manager, Manufacturing, $3-$10B USD

The bottom line is, if you are shopping for a new endpoint security solution, look for three key things:

These three elements work together to give you the best of all possible worlds: one where your organization is protected, and you don’t have to waste time, money, and effort getting there.

Would you like to learn more about how enSilo’s ease of deployment takes the headaches out of installation? Please sign up for a demo today.

Related Blog Posts

How To Handle The Increase In Powershell Attacks ? one

enSilo Corporate and Product

“Nearly 98% of all recorded point of sale (POS) attacks resulting in a confirmed data breach”. Verizon Data Breach Investigations

PROBLEM:

.

Read More

Customers Say It Best - Managed Security Service Provider one

enSilo Corporate and Product

 

Retailers, restaurants, hoteliers, and small businesses are having problems discovering breaches on their POS systems. Delayed detection of a.

Read More

5 Ways to Tackle Ransomware Attacks One

enSilo Corporate and Product

“Nearly 98% of all recorded point of sale (POS) attacks resulting in a confirmed data breach”. Verizon Data Breach Investigations

PROBLEM:

.

Read More

enSilo Blocks New Variant of Adwind RAT one

enSilo Corporate and Product

“Nearly 98% of all recorded point of sale (POS) attacks resulting in a confirmed data breach”. Verizon Data Breach Investigations

PROBLEM:

.

Read More