Immunity

Immunity

Tesorion Immunity protects your network and data against malware. Immunity offers the network administrator more control over the network by combining access control with network security.

Clip path group@2x

Team aan het werk

Tesorion Immunity in practice

control over your network

Network security comes in many forms. Controlling which devices are allowed access to your network is a first step. By combining this control with automated infection detection and isolation of the affected device, a powerful combination is created. You decide who is allowed in and which parts of the network they can access.

To monitor what is happening on the network and, if desired, to be able to intervene automatically, Tesorion Immunity communicates with your network equipment. The brand of the hardware is irrelevant. Most commonly used switches, access points, and wireless LAN controllers for enterprise networks are supported. The supported device list provides an up-to-date overview.

Always available

Tesorion Immunity is suitable for:

Tesorion -Schild-Wit

IT

Every organization uses computers, tablets, and smartphones. In addition, you may use other smart devices, such as printers and cameras.
Should one of the devices on the network accidentally come into contact with malware, Tesorion Immunity offers the possibility to immediately (automatically) isolate these devices from the rest of the network and prevent spread.

Tesorion -Schild-Wit

OT

OT systems are increasingly being connected to the IT network or directly to the internet. As a result, these systems can be exposed to cyber threats. For example, when a supplier requires internet access for maintenance. Network segmentation plays an important role here in preventing cybercrime.

Tesorion -Schild-Wit

Guest access

Your organization has to deal with a multitude of visitors. These may include guests, engineers or suppliers, for example. For each of these visitors, a decision must be made about which access level is required and for which duration. Tesorion Immunity helps you maintain visibility and control over all devices that want to access your network.

Current status

Tesorion Immunity is about controlling which devices are allowed access to the network: Network Access Control. For example, you want to grant a smartphone on the guest network a different type of access than a laptop used by the finance department.

With Immunity, you decide who has access to the network and which permissions come with it. This gives you greater control over the devices on the network without installing additional software. Immunity monitors what is happening on the network and - if desired - takes automated action. In addition to the built-in detection, Immunity can also link external detection sources and intervene immediately based on those signals.

Who do you let into your network?

Port-side control alone is not enough to protect the network. To protect all company data as well as possible, you want to grant different permissions to different groups of users and devices. You decide who is allowed access the network and what permissions come with it. Based on this, Immunity automatically places (guest) users and devices in the right segment.

Does an employee in a specific network segment click on a phishing link or is a printer being hacked? Then it will be isolated as quickly as possible and only part of the network will have been at risk, not the entire organization.

Tesorion Immunity takes automated action by quarantining the suspicious device and informing the IT department. In doing so, you can decide what the action is for each group. After all, you don't want to just stop a production process, for example. While in other situations, immediate intervention is not a problem. You decide which action is appropriate at what time.

More information about new features in Immunity can be found in the release notes.

contextengine EN
Ellipse 6
Contact

I want to know more about Immunity

I would like more information about how Immunity can contribute to increasing my organization's cybersecurity. Get in touch with me.

Contact Us

Tesorion uses your data to send the requested information. In addition, your data may be used for commercial follow-up. You can unsubscribe from this at any time via the link in the email. For more information, read our privacy policy.

Opt-in-EN

Trusted by leading organizations in the Netherlands

Nice to meet you, we are Tesorion

Tesorion is a Dutch multidisciplinary cybersecurity company that offers continuous monitoring and detection of cyber threats as well as incident response. With over 100 experts, we do everything we can to protect your organization 24/7 against cyber attacks and data leaks.

Dekra logo wit
Ellipse 6