Endpoint Security

Endpoint Security

Endpoint Security Solutions

End points are classified as any endpoint device on your network or passing through your IT eco-system. For example, desktops, laptops, smartphones, servers on-premise and servers based in the cloud (hosted by a 3rd party).

The phrase end point security should not be confused with the term ‘mobile’ security, because in our opinion ‘mobile’ classifies only mobile roaming devices, such as laptops, smartphone and tablet devices (iPADs).


> Anti-Malware protection for endpoints


> Multi-layer and context aware threat detection


> Secure your Windows, Mac, Linux and Virtual systems against malware and advanced threats


> Malicious traffic detection with real-time threat intelligence from Global Security Operations Labs (SOCs)



Endpoint Security Solution Features & Benefits

  • Anti-Malware
  • Anti-virus / Anti-spyware
  • Anti-Phishing
  • Web Control
  • Vulnerability Patch Management
  • Two-Way Firewall
  • Botnet Protection
  • Anti-spam
  • Data Loss Prevention
  • Application Control
 


Malware Protection 

Viruses, spyware, keystroke loggers, Trojans and rootkits are identified using signatures, behaviour blockers and heuristic analysis.


Malware Protection Improves Security Posture
  • Protect against new and unknown malware (zero-day exploits) to assess suspicious code / applications.
  • Keeps your network, endpoints and organisation resistant to the daily influx of new born and/or polymorphic malware.


Malware protection tool features & benefits: 


> File Security

> Mail Security > Gateway Security > Collaboration Security
- Microsoft Windows Server

- Microsoft Exchange - Linux / BSD / Solaris - Kerio
- Linux / BSD / Solaris
- Linux / BSD / Solaris


- Microsoft SharePoint

- IBM Lotus Domino




- Kerio


 


> Real-time, zero-day malware protection  

Block viruses, trojans, worms, adware, spyware, and other potentially unwanted programs that steal confidential data and sabotage user productivity.

> Real-time Scanning 

Enables malware monitoring and scanning of files as they are being opened for reading, writing, execution or being transferred onto / off your network.

> Signature and Behaviour-based protection

  • Delivers another layer of protection against threats for which signatures do not yet exist.
  • Advanced content and behaviour analytics to pre-emptively detect and block modern blended attacks, including viruses, worms, and spyware threats, without relying on virus signatures.
  • SandBox behavioral analysis runs suspect executables in a safe emulation to look for malicious behaviour and identify sophisticated zero-day malware.


    > Signature Matching Capabilities

    Recognises, blocks and removes viruses, worms, trojans and other types of malware such as keyloggers, hijackers and rootkits.

    > Variant and Exploit Detection 

    • Includes DNA Matching or partial signature matching that can detect components of malware that have been re-used from previous attacks.
    • Exploit Detection detects and stops hidden malware that has been injected into otherwise benign file types such as .PDFs.

    > Identify techniques for exploiting web browser vulnerabilities


    > Threat emulation

    Suspicious files are submitted for cloud-based analysis replaying malware in a live environment to determine whether or not they are malicious.

    > Email protection  

    (anti-spam & anti-virus) on premises, in the cloud, or an integrated combination of both (for example, inbound email filtering in the cloud, outbound data loss prevention [DLP], and encryption on premises.

    > Centralised Management 

     

    > Audit and Logging

    Log all device usage and data transfer activities on your network to mitigate risk and remain secure.

    > Application Control

    Allows only approved software programs to run on the endpoint (Black-listing and white-listing).

    > Fastest malware and anti-virus scan and boot time


    > Support for virtualisation platforms

    Virtual server protection
    Integrates with vShield Endpoint, off-loading critical security analysis from protected virtual machines to a dedicated security virtual appliance - optimising scan performance, resource utilisation, and increased management visibility.

    > Host based forensics of malware scans and events

     



    > Malware protection through blended controls 


    • Web Control
    Category-based web filtering enforced on and off the corporate network.

    • Application Control
    Point-and-click blocking of applications by category or name.

    • Device Control
    Managed access to removable media and mobile devices.

    • Data Control
    Data loss prevention (DLP) using pre-built or custom rules.



    Endpoint Anti-virus

    Protects laptops, desktops (Windows and Mac) servers, tablets, and embedded devices like point of sale (POS) terminals, automated teller machines (ATMs) and self-service check-outs.

    Firewall

    A rules-based firewall with integrated intrusion prevention engine blocks malware before it can enter a system / end point.

    Vulnerability Patch Management 

    Reduces organisational risk and optimises IT operations through the timely, proactive elimination of OS and application vulnerabilities across all endpoints and servers. Heterogeneous platform and 3rd party vulnerability content support includes Microsoft Windows, UNIX, Linux, Apple, Adobe, Oracle Java and more. 

    Cloud Based Anti Malware Services

    As a cloud-based (hosted) service, it requires no server and no maintenance.

    Protect PCs, Macs, Androids, iOS Devices, Servers, Point of Sale Devices, Tablet PCs, USB Drives.


    Features

    Intrusion detection and prevention (IDS/IPS), firewall, anti-malware, web reputation, log inspection, and integrity monitoring.


    Protects Against
    • Viruses
    • Hackers
    • Spyware
    • Dangerous websites
    • Phishing
    • Data theft





    Contact SecureNet Consulting today for solutions advise, professional services, engineering and proof of concept resources for endpoint security solutions.


    SecureNet Consulting Professional Services
    SecureNet Consulting Technical Engineering
    http://www.securenetconsulting.co.uk/p/contact-us.html
    SecureNet Consulting Managed Services
    SecureNet Consulting IT Support Services
    http://www.securenetconsulting.co.uk/p/training_7.html



















    +44(0)7714 209927
    +44(0)1273 329753
    info@securenetconsulting.co.uk

    http://eepurl.com/GKx25https://www.linkedin.com/in/paul-rummery-0b89535http://www.fhttps/www.facebook.com/pages/SecureNet-Consulting/188102854572105https://plus.google.com/116898209106255177774