GARRISON ISOLATION APPLIANCE

Protect Sensitive Systems from Web-Based Threats.

exchangehero

Beyond software-based isolation.

Leverage hardware-based security and acceleration to deliver a high-assurance, performant end user experience without compromise.

The Garrison Isolation Appliance (GIA) forms the heart of any web solution. Whether deployed on-premises or via a cloud service, the GIA provides core isolation security for all web browsing and other interactive applications.

  • Secure

    Reach an unparalleled level of security while meeting modern workforce demands. Not only does the GIA solution transform risky content into safe content, it also verifies that only safe content is transferred across the isolation boundary – a barrier that is fully enforced at the hardware level.

  • Scalable

    Designed for enterprise scale and easy installation, the Garrison Isolation Appliance (GIA) can be used stand-alone for basic deployments or integrated into an existing proxy and authentication infrastructure. Each appliance can scale to many thousands of users and deployments can be customized to fit each use case.

  • Flexible

    Integrates with almost all existing proxy solutions and works with standard enterprise authentication mechanisms, the appliance can support a broader range of specialist isolation requirements, including access to untrusted Virtual Desktop Infrastructure (VDI) farms or other third-party applications.

Use Cases

Appliance Form Factors

Appliance Form Factors

The Garrison Isolation Appliance is a rackable appliance that comes in Enterprise (3U) and Reduced (1U)  form factors to match scaling requirements.

GIA Exploded

Flexible Deployment Options

Each appliance can be used stand-alone or as part of an enterprise-scale deployment, complete with cross-site redundancy and high-availability.

On-Prem: For customers who require a traditional network perimeter architecture, every GIA comes with three physically separate network interface ports for maximum network isolation.

Cloud: For customers who don’t want hardware, the GIA can be deployed in a zero trust cloud as-a-service architecture.

Request a Demo
GIA Easily Integratable

Integrates with Existing Infrastructure

Designed to complement existing infrastructure and assets, and minimize the cost and disruption to operations, the GIA integrates with almost all existing proxy solutions and works with standard enterprise authentication mechanisms.