Endpoint Firewall Protection
Anti-virus software alone will not stop threatsProtecting internal and external 'endpoint' devices
Solution Features & Benefits
> Protecting workstations, laptops and servers against viruses,
worms, malicious and ransomware hackers
> Enables IT administrators to strike a balance between security,
performance, productivity while simplifying endpoint security administration
> Compliance check: systems failing compliance can be directed to
remediation
> Completely transparent and invisible to the user
> Context aware
> Centrally managed administration console enables centralised
policy and rules based management for all your endpoints
> Stateful IP filter with powerful rule sets that allow detailed
control of all inbound and outbound traffic on all adapters and network
interfaces with automatic protection against malformed and illegal network
packets
|
> Deep-packet inspection engine monitors incoming and outgoing
traffic for network protocol deviations, suspicious content that signals an
attack, or security policy violations
> Ability to inspect encrypted and clear text network traffic
> Application white listing
> Zero day vulnerability, polymorphic, advanced threat, stealth
attack detection and alerting
> Behaviour based protection based on application scoring for more
accurate false positive prevention
> Alerts fed to global SOC teams which review global threats 24/7
and ensure your endpoints are protected
> Central policy management of remote endpoint devices
> Can co-exist with other personal firewall products, if needed
|
Every Device Should be Protected
A threat often first infects a single laptop while outside the network perimeter, and then when the laptop connects to the internal network, the threat spreads to other endpoints. Endpoint firewalls can be leveraged not only to block internal network attacks from breaching any endpoint connected to the network, but also to prevent these threats from ever leaving the initially infected endpoint.
Threat protection on endpoints is critical to protect from blended threats and to inhibit outbreaks. To be effective, it must encompass more than a firewall. Network threat protection should include a blend of state-of-the-art protection technologies, including intrusion prevention and sophisticated capabilities (anti-virus, anti-spyware), to control network communications
Servers and clients are both vulnerable to attacks from any machine that can
communicate with them, whether an attacker exploits a weakness in the applications or from a vulnerability in the underlying operating system. Network firewalls and other security devices provide some protection from external threats, but not from threats sourced from within the same network. In order to protect machines in the same network or security zone from each other, every device should be protected by its own firewall.
Device Firewall protects Windows workstations and servers from these attacks by limiting the traffic that an endpoint can send or receive.
Also See
- IDS / IPS systems
- Malware / anti-virus spyware software
- Device control
- Network access control
(discovers and evaluates endpoint compliance status, provisions the appropriate network access, provides automated remediation capabilities, and continually monitors endpoints for changes in compliance status)
![]()
P: +44(0)7714 209927
S: +44(0)1273 329753
| ![]()
info@securenetconsulting.co.uk
|