GARRISON ISOLATION APPLIANCE
Beyond software-based isolation.
Leverage hardware-based security and acceleration to deliver a high-assurance, performant end user experience without compromise.
The Garrison Isolation Appliance (GIA) forms the heart of any web solution. Whether deployed on-premises or via a cloud service, the GIA provides core isolation security for all web browsing and other interactive applications.
Secure
Reach an unparalleled level of security while meeting modern workforce demands. Not only does the GIA solution transform risky content into safe content, it also verifies that only safe content is transferred across the isolation boundary – a barrier that is fully enforced at the hardware level.
Scalable
Designed for enterprise scale and easy installation, the Garrison Isolation Appliance (GIA) can be used stand-alone for basic deployments or integrated into an existing proxy and authentication infrastructure. Each appliance can scale to many thousands of users and deployments can be customized to fit each use case.
Flexible
Integrates with almost all existing proxy solutions and works with standard enterprise authentication mechanisms, the appliance can support a broader range of specialist isolation requirements, including access to untrusted Virtual Desktop Infrastructure (VDI) farms or other third-party applications.
Use Cases
Appliance Form Factors
The Garrison Isolation Appliance is a rackable appliance that comes in Enterprise (3U) and Reduced (1U) form factors to match scaling requirements.
Flexible Deployment Options
Each appliance can be used stand-alone or as part of an enterprise-scale deployment, complete with cross-site redundancy and high-availability.
On-Prem: For customers who require a traditional network perimeter architecture, every GIA comes with three physically separate network interface ports for maximum network isolation.
Cloud: For customers who don’t want hardware, the GIA can be deployed in a zero trust cloud as-a-service architecture.
Integrates with Existing Infrastructure
Designed to complement existing infrastructure and assets, and minimize the cost and disruption to operations, the GIA integrates with almost all existing proxy solutions and works with standard enterprise authentication mechanisms.