Endpoint Security Solutions
End points are classified as any endpoint device on your network or passing through your IT eco-system. For example, desktops, laptops, smartphones, servers on-premise and servers based in the cloud (hosted by a 3rd party).The phrase end point security should not be confused with the term ‘mobile’ security, because in our opinion ‘mobile’ classifies only mobile roaming devices, such as laptops, smartphone and tablet devices (iPADs).
> Anti-Malware protection for endpoints
> Multi-layer and context aware threat detection
> Secure your Windows, Mac, Linux and Virtual systems against malware and advanced threats
> Malicious traffic detection with real-time threat intelligence from Global Security Operations Labs (SOCs)
Endpoint Security Solution Features & Benefits
|
|
Malware Protection
Viruses, spyware, keystroke loggers, Trojans and rootkits are identified using signatures, behaviour blockers and heuristic analysis.Malware Protection Improves Security Posture
- Protect against new and unknown malware (zero-day exploits) to assess suspicious code / applications.
- Keeps your network, endpoints and organisation resistant to the daily influx of new born and/or polymorphic malware.
Malware protection tool features & benefits:
> File
Security |
> Mail Security | > Gateway Security | > Collaboration Security |
- Microsoft Windows Server |
- Microsoft Exchange | - Linux / BSD / Solaris | - Kerio |
- Linux / BSD / Solaris
|
- Linux
/ BSD / Solaris |
- Microsoft SharePoint
|
|
- IBM
Lotus Domino |
|||
- Kerio |
> Real-time, zero-day malware protection
Block viruses, trojans, worms, adware, spyware, and other potentially unwanted programs that steal confidential data and sabotage user productivity.> Real-time Scanning
Enables malware monitoring and scanning of files as they are being opened for reading, writing, execution or being transferred onto / off your network.> Signature and Behaviour-based protection
- Delivers another layer of protection against threats for which signatures do not yet exist.
- Advanced content and behaviour analytics to pre-emptively detect and block modern blended attacks, including viruses, worms, and spyware threats, without relying on virus signatures.
- SandBox behavioral analysis runs suspect executables in a safe emulation to look for malicious behaviour and identify sophisticated zero-day malware.
> Signature Matching Capabilities
Recognises, blocks and removes viruses, worms, trojans and other types of malware such as keyloggers, hijackers and rootkits.> Variant and Exploit Detection
- Includes DNA Matching or partial signature matching that can detect components of malware that have been re-used from previous attacks.
- Exploit Detection detects and stops hidden malware that has been injected into otherwise benign file types such as .PDFs.
> Identify techniques for exploiting web browser vulnerabilities
> Threat emulation
Suspicious files are submitted for cloud-based analysis replaying malware in a live environment to determine whether or not they are malicious.> Email protection
(anti-spam & anti-virus) on premises, in the cloud, or an integrated combination of both (for example, inbound email filtering in the cloud, outbound data loss prevention [DLP], and encryption on premises.> Centralised Management
> Audit and Logging
Log all device usage and data transfer activities on your network to mitigate risk and remain secure.> Application Control
Allows only approved software programs to run on the endpoint (Black-listing and white-listing).> Fastest malware and anti-virus scan and boot time
> Support for virtualisation platforms
Virtual server protectionIntegrates with vShield Endpoint, off-loading critical security analysis from protected virtual machines to a dedicated security virtual appliance - optimising scan performance, resource utilisation, and increased management visibility.
> Host based forensics of malware scans and events
> Malware protection through blended controls
Category-based
web filtering enforced on and off the corporate network.
Point-and-click
blocking of applications by category or name.
|
Managed
access to removable media and mobile devices.
Data
loss prevention (DLP) using pre-built or custom rules.
|
Endpoint Anti-virus
Protects laptops, desktops (Windows and Mac) servers, tablets, and embedded devices like point of sale (POS) terminals, automated teller machines (ATMs) and self-service check-outs.Firewall
A rules-based firewall with integrated intrusion prevention engine blocks malware before it can enter a system / end point.Vulnerability Patch Management
Reduces organisational risk and optimises IT operations through the timely, proactive elimination of OS and application vulnerabilities across all endpoints and servers. Heterogeneous platform and 3rd party vulnerability content support includes Microsoft Windows, UNIX, Linux, Apple, Adobe, Oracle Java and more.Cloud Based Anti Malware Services
As a cloud-based (hosted) service, it requires no server and no maintenance.Protect PCs, Macs, Androids, iOS Devices, Servers, Point of Sale Devices, Tablet PCs, USB Drives.
Features
Intrusion detection and prevention (IDS/IPS), firewall, anti-malware, web reputation, log inspection, and integrity monitoring.
Protects Against
|
|
Contact SecureNet Consulting today for solutions advise, professional services, engineering and proof of concept resources for endpoint security solutions.
