JentüPlatform sits as a server-side application within your network and is cornerstone of your endpoint security posture, is key to your performance, and reduces costs and consumption of resources.
Security with JentüPlatform
The JentüPlatform server replaces all hard drives on your network used by endpoints. Specifically, it provides boot capability to servers, workstations, and IoT devices over the network. Because your endpoints are now image-based, their security is vastly improved. Subsequently, each time they boot they come up pristine. All the while, we map all authorized data to mutable storage, OS and application data are all image based.
When it comes to your company’s data security, hackers and users are a big problem. We see daily endpoint corruption occur from viruses, trojans, cryptolockers, bad patches, or even user error. But endpoints protected by JentüPlatform are immune to issues from all of these sources.
Performance from JentüPlatform
Performance is improved across all endpoint devices because we consolidate your storage resources. As a result we produce superior, centralized speed and performance. Because performance is extended to all endpoints, speed at the JentüPlatform server can be the speed at your endpoints. You will achieve SSD speeds at endpoint devices on 1 Gig networks and better than NVME speeds on 10Gig networks. Additionally, your speed can scale deep and wide as you put more resources into your central data structure.
JentüPlatform Savings
Last but not least, management of workstations and endpoints is a straightforward matter with JentüPlatform. You can switch between Operating Systems or between patch levels trivially. Also, you can also roll back bad patches or deploy new applications and patches easily. If unsanctioned changes are made by users, cryptolocking, bad software, or bad patches, simply roll back. Subsequently, your staff will spend less time on ‘break-fix’ issues. Also, as a result, you’ll spend less money in exchange for improved performance and security. That is a good trade-off in anyone’s book.
Because endpoints need no storage, we reduce costs for each endpoint you purchase now and in the future. Energy consumption as well as cooling for devices is also reduced. Since storage failure is the most common reason for end of life considerations, an increase in lifetime for deployed devices is also common.
Jentü allows you to manage threats to the endpoint and will ultimately save you in any kind of cryptolock breach. The average breach cost enterprises US$13 million in 2019. Not only will you insure against this threat by deploying a JentüPlatform server, you will also see that it saves you money.
“Research Shows 82% Of Security Breaches Start With Users”
How Does JentüPlatform Work?
First, you install and configure a central JentüPlatform server on your network and connect it to your network switch. Within this server you place high speed storage and connect via high speed Ethernet. The faster you make this server, the more performance you give to endpoints.
Next, pull the hard drive out of a workstation that you will use to create a golden image. Boot it from the network. JentüPlatform server will allow you to provision this workstations image onto the library of images from which you can boot. Once finished, you can deploy this image to dozens, hundreds, or even thousands of workstations.
Use your directory services, group policy, or other folder redirection. You split the OS and application environment from your users environment. Set your users desktop, documents, and other changeable data on a revisioned Network Attached Storage and you will find that it is far easier to backup all user data and create off-endpoint snapshots for all data. From here, your users will use the same image over and over again without the ability to change the OS or applications. Admins can update these images as needed but hackers and users cannot.
Are we saying that when you turn on an endpoint it receives a “fresh” Operating System?
Yes. A JentüPlatform server deployment does away with the largest attack surface on a computing device, the hard disk drive (HDD). Each of your departments can have their own pre-approved OS and application stack. For example, your accounting department would receive the “accounting” image and your legal department will receive a “legal” image.
Each power cycle of a user’s machine will result in the delivery of the approved OS at boot time. Unless authorized, we destroy any changes to alls aspects of the OS or Application Layer each time you power off a machine. Furthermore, any known or unknown malicious software introduced by the user, applications, or direct hacks are also purged each reboot.
Are there any performance tradeoffs if I use a centrally managed OS?
None! 1 Gigabit network cards can produce SSD performance and 10 Gigabit networks typically exceed NVME performance. Additionally, tools like caching, network QoS, and bonding of interfaces on your JentüPlatform server can further improve and scale performance. In many cases, hard disks drives are the principal bottleneck on older machines. This is especially true if you have spindle disks on your endpoints.
With a JentüPlatform server, your endpoints will benefit from common operating systems. We have built the JentüPlatform server to maximize efficiency.
“Cybersecurity Ventures predicts cybercrime will cost the world in excess of $6 trillion annually by 2021, up from $3 trillion in 2015.”
Is A JentüPlatform Server Easy To Manage?
JentüPlatform uses a cloud management platform to configure your on-premise JentüPlatform servers. Because your site contains your JentüPlatform server, if network communication interrupts connectivity to the cloud-management platform, your JentüPlatform will continue to operate as configured.
Please note, we never store user data offsite. You control your data. And you control your snapshots. You control your storage network. And lastly, you control your users and you control your endpoints!
“The average costs of data breaches will reach into the hundreds of millions of dollars by 2020.”
What Is The Process Once You Buy?
It’s actually quite simple. You identify a preferred server or purchase one from us. We help you install and configure the JentüPlatform software, enable your license key, and activate it.
The complexity to start JentüPlatform using is low. A majority of effort by your IT team will be spent on building out the departmental OS and Application images. The JentüPlatform portion is quite easy to use and once you have created your first image, you will spend most of your time increasing the capabilities of your operating environment. Like a car, operation is easy but the places we will go may vary.
Click here for a list of recommended hardware.
Training is key to success.
As with any new technology you will need to train your IT team in JentüPlatform. A majority of this training is actually OS oriented for Windows and Linux. Comparitively, little of the implementation complexity focuses on JentüPlatform but rather on knowing distributed OS skills like folder redirection and group policy.
With your IT team freed from constant endpoint break-fix efforts, consider how you will apply your IT resources to future challenges. Imagine the places we will go!
“The Internet of Things (IoT) is primed to revolutionize life for businesses and consumers alike. However, the inherent vulnerability of this nascent technology can leave it wide open to ransomware attacks. A report by Kaspersky Lab indicated that new malware targeting IoT enabled devices grew threefold in 2018. Since 2017, the number of IoT focused malware attacks rose 10x from 2016.”
I’m Interested. What Do I Do Now?
We understand that Jentü is a new way of thinking about your network. You’re likely wanting to learn more, engage in a proof-of-concept, or maybe you’re ready to start using JentüPlatform now.
Next Steps (depending on your current position):
I don’t believe this is possible. We’re happy to set up a demo for you, give your team a hands on experience with JentüPlatform server in our demo environment.
What if I believe you, but I need to see how this looks in my environment. We offer proof-of-concept (POC) deployments for your organization who want to try JentüPlatform in a safe, controlled environment. As this requires some effort on our side and yours, let’s craft a demo solution together.
OK, I believe you. Let’s start today. Let us set a time to draw up a design for your organization in order to meet your needs and goals. Following our discovery process, we’ll provide you with a quote and a preliminary guide on deployment.
Call us and harness the power of Jentü. We want to help!