configXO

Automatisierung von Sicherheit und Compliance

STIG, CIS, SiSyPHuS und mehr. Die Einhaltung von Compliance-Richtlinien auf Windows-Arbeitsplätzen und -Servern sicherstellen – auch ohne Zugriff auf das Firmennetzwerk.

No credit card required

XOAP manage server and desktop overview
CONFIGURATION MANAGEMENT ACROSS PLATFORMS

Systemübergreifende Sicherheit leicht gemacht

IT-Betrieb verschlanken für effizienteres Management und einheitliche Systemkonfigurationen. Mit vordefinierten Vorlagen Sicherheitsabweichungen sofort beheben.

Various security and compliance templates – adapt to any scenario

1

configXO system overview

CONNECT

Alle Systeme verbinden – im Unternehmen, unterwegs oder im Homeoffice. Ganz ohne VPN!

2

configXO nodes

EVERYTHING

Physische Arbeitsplätze und virtuelle Desktops auf Azure und AWS werden mit derselben Konfiguration betrieben – ganz ohne komplexe Infrastruktur.

3

configXO group with application role

CONTINUOUS

Einzelsysteme, Schulungsräume oder voll ausgestattete Arbeitsplätze – Standards definieren und Systeme kontinuierlich absichern.

4

configXO analytics

ANALYTICS

Zentrale Analyse und Auswertung aller verbundenen Systeme – schnelle und einfache Reaktion auf Fehler und Sicherheitslücken

Desired State Configuration über hybride IT-Infrastrukturen hinweg

Konfiguration automatisieren und plattformübergreifend vereinheitlichen? Desired State Configuration vereint die Leistungsfähigkeit von Automatisierung mit einer benutzerfreundlichen Oberfläche.

Consistency across hybrid infrastructures

Define the desired configuration for your infrastructure and then apply it consistently across your environment. This helps you reduce configuration drift and ensure that your systems remain in a known, good state, making configuration management more efficient.

Console for infrastructure as code

Use DSC as part of an IaC approach to infrastructure management. By defining the desired state of your infrastructure as code, you can version-control your infrastructure and apply changes consistently across your environment. The intuitive UI makes it usable even for non-coders.

Compliance and security

XOAP can help you enforce security and compliance policies by ensuring that systems are configured in accordance with STIG standards, CIS benchmarks and more. You can use XOAP to validate that specific configuration settings are present on a system and view compliance reports about the status.

Software and application deployment

Automate the deployment and configuration of applications on target systems. You can use DSC to ensure that the necessary prerequisites and configuration settings are present before installing an application.

Gängige Technologien und Open-Source-Produkte werden in einer ganzheitlichen Lösung integriert

Nahtlose Integrationen in einer intuitiven Benutzeroberfläche nutzen. Systeme in hybriden IT-Infrastrukturen und über mehrere Plattformen hinweg individuell anpassen.

Desired State Configuration (DSC) Wizard

We provide a way to automate the management of system configuration, helping ensure that systems are configured as intended and remain in a desired state.

Upload and combine custom and community modules

Import existing modules into the console, including PowerShell modules, scripts and DSC resources. Extend them with your own use-cases that are not covered.

50+ configuration templates and best practices

Every account comes with a set of predefined templates and best practices you can use directly to create new system configurations.

Central analytics, logging and inventory

Our DSC baseline module gathers a large variety of system information on connected nodes and makes it easy to extend the gathered information.

Continuous Integration (CI) and Continuous delivery (CD)

Use existing Desired State Configurations (DSC) to create your machine image templates according to various security standards and compliance regulations.

Simple console and guided wizard for DSC

Use our DSC Configuration Wizard to create configurations without the need to code and ensure that IaC is performed consistently and according to best practices.

Ready to automate Security and Compliance Benchmarks

Simple delivery and automation of Center of Internet Security (CIS), Security Technical Implementation Guidelines (STIG), BSI Privacy Settings and more.

Live-Demonstration: So wird das System schnell gehärtet und kontinuierlich aktuell gehalten

de_DE
Nach oben scrollen