The SafeConnect solution provides the flexibility to select and use only the policy modules needed to satisfy the requirements of their security plan. Administrators can implement policy modules standard to the SafeConnect solution including compliance with anti-virus, anti-spyware, Microsoft OS patches, peer-to-peer file sharing, as well as registration and authentication. Custom policies can also be created based on the existence or non-existence of file types, registry settings, services, and processes on endpoint devices.
How SafeConnect is Different Simply put, safe access for devices and users that is both simple and easy to use is what makes SafeConnect different. We believe that a positive user experience is essential. It has to be easy and intuitive. SafeConnect is specifically designed with this type of user, and management, experience in mind.
From real-time monitoring, to flexible licensing and 24/7 maintenance, to new device finger-printing and custom policy creation, SafeConnect will prove time and again that it is the easiest BYOD solution available.
Contextual Intelligence SafeConnect provides the ability to not only automate the enforcement of security and compliance policies, but also gathers a wealth of context-aware device information so you can make informed and intelligent decisions about your network. Impulse’s Contextual Intelligence™ technology delivers real-time device information that correlates identity/role, device type, and location (along with other attributes such as ownership and compliance status) over time to power its SafeConnect solution.
Information gleaned “in context” regarding mobile devices on the network (both real time and historically) allow IT managers to make better decisions on network capacity, risk mitigation, and forensic analysis required for addressing compliance. Accessing real-time contextual information also reduces the number and length of help desk calls by improving the end user experience.
Policy Enforcement Flexibility SafeConnect supports freedom by providing flexible enforcement options that can be determined by campus location or user identity (i.e. faculty or administrative staff, students, guests, employees, etc) based on the philosophy of the organization. We understand that every company has its own policies, procedures, and beliefs. We won’t dictate policy standards, but instead will help you in developing security policies that reflect your corporate culture. Multiple enforcement options are available and can be chosen based on the user’s assigned policy group (identity) and the individual policy modules.
Visibility and Control SafeConnect delivers on our promise of an easy BYOD solution with little or no intervention through automated remediation services, “no hands” system updates, and true-real time system reporting – providing you with the real-time visibility and control you want.
Speed to Deployment Getting other systems operational can take weeks or even months of work. SafeConnect can be installed in minutes and fully deployed in a matter of hours. Our engineers can provide insights on common practices which accelerates the full deployment process. From remote installation and real-time monitoring to “no hands” system updates, see SafeConnect in action to fully appreciate it.
The Impulse Experience=Freedom We understand that it’s not only about the network. It’s about the user and their experience and how that experience reflects on the help desk, the security officer, the network team, systems administration, and business decisions. Ultimately, the “experience” is the result of the way Impulse does things. And it all goes back to our user-centric business philosophy. This full-service solution approach combines Impulse’s products with expert technical support and network insight. As a result, our clients gain an enduring and evolving solution that is able to address ever-changing security, intelligence, and visibility and control demands.
At Impulse, our philosophy is that a BYOD system should operate completely independent of the network infrastructure. SafeConnect is designed specifically with this in mind and is the only solution on the market that can make this claim. This freedom allows network administrators the ability to run their operation without having to consider switch compatibility, configurations or port settings. This significantly eliminates complexity and constant management found with other solutions.
Real-Time Identity for Mobile Devices Not only real-time monitoring for security assessment but real-time identity for mobile devices! SafeConnect is designed to deliver the real-time identity-to-device association required to support the BYOD mobile device explosion.
Reduction in Help Desk Calls The SafeConnect solution is easy to deploy and manage, and helps drive a substantial reduction in help desk calls because it is intuitive and user friendly for both the end users and IT support management teams.
SafeConnect’s Standard Policy Modules SafeConnect is delivered with standard Policy Modules (Authentication, Self-Provisioning Guest Registration, Acceptable Use Policy Auditing, Anti-Virus, Anti-Spyware, Microsoft Patch, P2P File Sharing, and Access Point), as well as a Custom Policy Builder Module that allows an organization to easily create policies, enforcement rules, and custom notification messaging based on file types, services, process, and registry settings that may exist or might not exist on a particular endpoint.
Privacy Considerations SafeConnect is not “content aware”. It cannot check for arbitrary data in a particular file, or return the file itself. It can only return a true/false check on the presence (or absence) of a file, provided the complete path is given. Any data stored in the SafeConnect Policy Enforcer is either requested for business purposes (userid/network username) or can be easily obtainable from the network itself. (Mac Address, IP address, Windows Machine Name, etc).
In short, Impulse will never collect or store personal information from its customer’s constituents, and will never communicate directly with end-user Policy Key-enabled devices that exist outside of a SafeConnect Managed Network environment.