Documentation
- Home
- Documentation
Whiteswan Documentation: Unified Zero Trust Security Solutions
Welcome to Whiteswan’s comprehensive documentation, your go-to resource for mastering our identity-first Zero Trust security platform. This guide empowers security administrators, IT teams, and business leaders through every phase of setup, configuration, and optimization.
Key Features of the Whiteswan Platform
- Endpoint Privilege Access Management (PAM): Govern and monitor endpoint privileges with adaptive identity micro-perimeters.
- Server PAM: Secure and manage privileged server access with session control, MFA onboarding, and just-in-time access.
- Zero Trust Infrastructure Access: Provide identity-centric access to resources with Mesh VPN, passwordless authentication, and no traditional gateways.
- Identity Threat Detection and Response (ITDR): Proactively mitigate identity-based threats using real-time behavioral analysis and automated responses.
Getting Started Guides
- Platform Installation: Deploy the Whiteswan unified agent across Windows, Linux, and macOS. This streamlined process requires no complex gateways or HSMs.
- Configuration and Setup: Step-by-step instructions for configuring identity perimeters, leveraging existing identity providers (Active Directory, Okta).
- Integration with Existing Infrastructure: Tutorials for integrating Whiteswan with cloud services (AWS, Azure) and on-prem environments like VMware.
Zero Trust Infrastructure Access
- Identity-Centric Approach: Assess user and device risk to grant secure, context-driven access.
- Passwordless Authentication: Secure access via device TPMs, eliminating traditional password management.
- Short-Time-to-Live Sessions: Apply dynamic, least-privilege access with short-lived, just-in-time session control.
- No-Gateway Deployment: Use Whiteswan's Mesh VPN to bypass centralized gateways, reducing complexity and enhancing scalability.
Additional Features
- Conditional MFA: Apply adaptive MFA based on real-time risk assessments for specific resources.
- Granular Access Controls: Enforce allow/deny lists and just-in-time privilege grants for highly specific access control.
- Identity Threat Detection: Integrate UEBA and ITDR to monitor unusual behavior patterns and mitigate identity-based threats like insider attacks.
Why Whiteswan's Unified Approach Stands Out
Whiteswan reduces operational complexity by consolidating Endpoint PAM, Server PAM, ZTIA, and ITDR into one unified platform. This single-console approach improves security visibility and streamlines workflows.
Key Differentiators:
- No Password Vaults: Innovative identity and privilege management eliminate the need for vaults,
- Mesh VPN Deployment: Simplify secure connections between endpoints and servers without requiring firewall configurations or network segments.
- Granular MFA Control: Extend MFA to cover system utilities, URLs, files, and lateral movements, where competitors often struggle to provide complete coverage.
Governance & Compliance
Whiteswan helps organizations comply with stringent regulations (GDPR, PCI DSS, HIPAA) by offering:
- Detailed logging and session recording
- Compliance-ready reporting
- Comprehensive MFA coverage across all critical resources
Troubleshooting & Support
Access a wealth of resources, including:
- Common Troubleshooting Scenarios: Resolve issues around agent installation, connectivity, and MFA.
- Frequently Asked Questions (FAQs): Detailed answers to frequently encountered challenges.
- Direct Support: Reach out to our dedicated support team for additional technical assistance.
A few of our happy clients
Ready to Implement Zero Trust with Whiteswan?
Embark on your Zero Trust journey with Whiteswan’s unified platform. Streamline security operations, reduce complexity, and improve visibility—all from one comprehensive console.