Why You Need Promisec


You need a new kind of approach to tackle today’s threats.

You need a new kind of approach to tackle today’s threats.

It used to be that just keeping your antivirus (AV) up to date kept you out of harm’s way. Then along came malware detection, which is really AV for your browser in disguise. Then came application blockers, which are nice until you realize that your IT tickets are increasing proportionally to the decrease in authorized applications (not to mention the added user frustration). Other solutions record and block potential threats being thrown at your endpoints.

The problem is, these solutions don’t always mesh well, and there are some challenges that they leave unaddressed:

  • Unified visibility and control over what’s running on your endpoints and servers for the myriad of security products trying to defend them
  • Ensuring that you can respond in seconds to the next threat to affect your servers and endpoints
  • Knowing that you are ready for the next generation of threats by sourcing the latest threat intelligence

What you need is a way to ensure that the software running on your endpoints is supposed to be there, and that you have complete control over it, all without installing additional security software. What you are currently using today likely falls well short of that goal. You need something different. That something is Promisec.


With Promisec you can achieve holistic endpoint security with no added agents, and ensure compliance at the same time.

Gain complete visibility across all of your endpoints

You gain complete visibility across all your endpoints, which means you can see every file, registry, process, network connection, third-party product and OS version. Complete visibility also means you can run continuously in environments that do not tolerate downtime, such as stock trading systems or supervisory control and data acquisition (SCADA) environments.

Gain complete visibility across all of your endpoints

Complete visibility means being able to see all files, all registries, all processes, all network connections, all 3rd party products (including security agents like AV suites), all polices (group and local) and all OS versions. Complete visibility also means all endpoints (Promisec doesn’t require installing security agents like our competitor’s do) and we can see all modern and legacy OSes. Complete visibility means continuously running in environments that do not tolerate downtime- such as stock trading systems and Supervisory Control and Data Acquisition (SCADA) environments.

Analyze everything

Promisec technology is the result of years of research and optimization, honing how we ask and understand what is running on an endpoint. The result is incredibly fast response times – less than ten seconds per endpoint – on advanced, enterprise-scale queries that can detect changes in your environment. By clearly defining policies and desired states, including support for various standards such as NIST and CIS, and by observing exactly how an endpoint changes, we can respond intelligently. In this way, we can automatically drive events to wherever need be – your SIEM, patch management team, endpoint protection team, security analytics team, or incident response team as necessary.

Analyze everything

Promisec has years of research that allows our technology to optimize how we ask and understand what is running on an endpoint. The result is incredibly fast (sub 10 second per endpoint) responses on advanced queries at enterprise scale that can detect change in your environment. By having a clear definition of how something is supposed to be (including support for any standard, NIST, CIS, etc) and how an endpoint changed, we can respond more intelligently with actions to drive events to your SIEM team, to your patch management team, to your endpoint protection team, to your security analytics team or to your incident response team or directly to your endpoint.

Respond with remediation or escalation

With a clear understanding of change or deviation from a known, compliant state, you can respond with clear actions. Promisec allows you to respond in one of three ways: automated (as defined by your rules), manual enabled actions (with built in right clicks on actions), or escalation to a SIEM or IT trouble ticket system. Promisec enables response with built-in actions which can remove blacklisted software, change policies, force applications to quit and uninstall, disconnect from the network or shut down completely. The Promisec platform also allows you to customize and create your own actions.

Respond with remediation or escalation

With a clear understanding of change or deviation from a known, compliant state, you can respond with clear actions. Promisec allows you to respond in one of three ways: automated (as defined by your rules), manual enabled actions (with built in right clicks on actions), or escalation to a SIEM or IT trouble ticket system. Promisec enables response with built-in actions which can remove blacklisted software, change policies, force applications to quit and uninstall, disconnect from the network or shut down completely. The Promisec platform also allows you to customize and create your own actions.

Report definitively

The Promisec platform allows you to report across organizational and regulatory guidelines with either standard out-of-the-box reports or custom reporting capabilities. Promisec also allows creation of advanced dashboards to keep an eye on what matters to your organization so you can filter out the noise. In this way, you stay on top of your endpoints, without putting extra software on them.

Report definitively

The Promisec platform allows you to report across organizational and regulatory guidelines in standard out of the box reports or via custom reporting capabilities. Promisec also allows creation of advanced dashboards to keep an eye on what matters to your organization and filter out the noise. Promisec enables you to stay on top of your endpoints, without putting extra software on them.

Deploy in days

Traditional agent-based security products take weeks or months to deploy in an enterprise, with weeks of planning and execution necessary to preventing disruption while doing so. A Promisec solution, because of its agentless architecture, can be deployed across thousands or tens of thousands of endpoints and servers in a matter of hours to just a few days, and requires very little support and maintenance on an ongoing basis. In many cases, customers will deploy a single unified server or a Promisec management server and a couple of Sentries to cover their entire enterprise, moving from planning to full deployment in hours.

Deploy in days

Traditional agent-based security products take weeks or months to deploy in an enterprise, with weeks of planning and execution necessary to preventing disruption while doing so. A Promisec solution, because of its agentless architecture, can be deployed across thousands or tens of thousands of endpoints and servers in a matter of hours to just a few days, and requires very little support and maintenance on an ongoing basis. In many cases, customers will deploy a single unified server or a Promisec management server and a couple of Sentries to cover their entire enterprise, moving from planning to full deployment in hours.