Security Controls is extremely scalable. You can use it in its most basic state immediately after installation to perform a number of agentless operations. If needed, you can choose to implement a number of different architectural features to accommodate large and complex environments. Review the following list and click the provided links to learn more about each feature.
•Agentless: Allows you to perform scans and deploy patches immediately after you install the ISeC console. Used to manage Windows-based networked machines. Can be used to deploy Microsoft and 3rd party vendor patches.
•Agent-based: Agents can be installed on both Windows and Linux machines.
•Windows environment: Agents are frequently used on disconnected machines and machines that reside in a DMZ. Agents are required in order to use Application Control.
•Linux environment: Agents are required in order to perform patch management tasks.
•Distribution Servers: Used at remote office locations.
•Remote ISeC Consoles: Used within disparate geographic locations and managed regions.
•Data Rollup: A central console receives data about machines managed by remote consoles.
•Security Controls Cloud: Enables your agents to check in and receive policy updates from the cloud.
•Disconnected Environments: A remote console that is located in a network that does not have internet access.
The following diagram illustrates a number of these architectural features.