Home
Back to overview

Quarantine mode

Quarantine mode is a security feature that isolates devices in a restricted environment when they do not meet predefined IT security policies. This functionality is primarily used in businesses to protect networks and sensitive data from potential security risks. Insecure devices, such as those running outdated software versions or with unauthorized apps installed, are automatically placed in quarantine mode.

While in quarantine mode, a device is granted only limited access to network resources or may be completely disconnected from the corporate network. Administrators are simultaneously informed about why the device has failed to meet security requirements and how it can be remediated to return to its regular operational state. This approach minimizes the risk of a compromised device endangering the entire IT infrastructure.

A major advantage of quarantine mode is the ability to identify and isolate security risks in real time. Devices can be continuously monitored via a central management platform and potential threats can be swiftly moved into quarantine mode. This gives IT teams adequate time to apply corrective measures before significant damage occurs.

This feature is particularly important for large organizations with many endpoints or BYOD scenarios (Bring Your Own Device). Devices with insecure apps, missing updates, or disabled security functions can be isolated from the productive network until required security actions are implemented. At the same time, IT departments maintain control over the integrity of the network and safeguard sensitive data.

Quarantine mode ensures that network security is maintained efficiently. It guarantees that only devices meeting the specified security requirements are granted unrestricted access to corporate resources. In an increasingly interconnected work environment, this feature provides companies with the necessary control to proactively address security risks and protect sensitive information.