logo
|
|
Career
|
|
|
1-877-INFOWIRE (463-6947)
Compliance and Security Expert  
 

Your Organization's  Clear Choice for Proactive Network Security

Host Intrusion Prevention

  Home > Host Intrusion Prevention
Professional Services
Audit Services
Fraud Detection and Control
Vulnerability Assessment
Disaster Recovery & BCP
Risk Assessment
Security Program Development
Incident Response
Remediation
Security Planning
 
Managed Services
Unified Threat Management
Network Intrusion Prevention
Log Management
Firewall
Host Intrusion Prevention
 
Staffing Services
Perfect Fit Program
Hiring Options
 

 

While signature-based anti-virus continues to be the primary endpoint protection mechanism in use today, there is a major shift occurring towards integrated threat management to enhance security.

Complicating the endpoint security equation further is the breakdown of client-server network architectures. As mainstream adoption of vitalization, mobile, wireless and remote access technologies force the traditional network perimeter to dissolve; the opportunity for worms and viruses to propagate has increased dramatically. In response, perimeter and network security capabilities are increasingly required on host endpoints.

  • Layered security protection that optimizes defenses against intrusion, viruses, spyware, worms, Trojans, and other malicious zero-day exploits
  • The ability to consolidate 5+ discrete endpoint security agents into 1
    agent and reap significant administrative time savings in the process
  • Reduce system resource requirements by over 50% compared to the memory
    footprint of maintaining 5+ discrete endpoint security products
  • Reduce endpoint security costs by over 50% by eliminating the licensing and support
    costs associated with buying and maintaining multiple endpoint security products
  • Gain centralized policy control over applications, system resources, and removable
    storage devices

Features and Benefits

Intrusion Prevention: Host based Intrusion Prevention provides protection where a vendor has not yet created signatures or patches to protect against vulnerabilities in their operating system or application.  Block "zero-day" attacks that bypass traditional signature-based solutions, eliminating the need or use of specific attack signatures.

System Protection: Provides control over which applications are allowed to function by authorizing or denying program file execution. Registry Protection prevents specific registry settings from being modified, stopping malicious programs from infecting or modifying systems. Storage Protection prevents data leakage by regulating USB and Firewire storage devices.

Firewall Protection: Performs traditional firewall duties, allowing or denying traffic based on a set of predetermined rules. Monitor the source of network traffic in real time and only allows traffic from authorized applications, preventing unauthorized programs from making illegal outbound connections.

Virus and Spyware Protection: Provides complete signature and heuristics-based attack protection. Using patented sandbox technology, actively blocks malicious activity from being loaded into memory. Signatures provide an additional protection layer but it is not signature dependent and can stop new attacks as they are released without the need for updates.

Security Management Console: Combined with Security Management Console, the integrated solution provides event and state analysis capabilities along with security and compliance reporting. The Security Management Console integrates attack-related information with local and network vulnerability assessment data, providing a complete security picture.

Active X Protection: Active X protection is based on patent pending technology that blocks threats at the lowest common denominator attack vector. This occurs by interfacing with the ActiveX system itself and using heuristics, signatures, and identification of suspicious calls, provides 100% effectiveness at blocking illegal remote code execution.

 

 

Need Help
We are here to help with your security and staffing needs.
email us
or call us at:
1-877 -INFOWIRE(463-6947)
Compliance Services
  GLBA/FFIEC
  HIPAA
  PCI
  NERC CIP
  FISMA
Industries Served
  Financial
  Insurance
  Healthcare
  Manufacturing
  Education
  Government
  Utilities
  Retail

       
META
HOME
ABOUT US
CAREER
PARTNERS
RESELLERS
CONTACT US
 
PROFESSIONAL SERVICES
AUDIT SERVICES
FRAUD DETECTION AND CONTROL
VULNERABILITY ASSESSMENT
DISASTER RECOVERY & BCP
RISK ASSESSMENT
SECURITY PROGRAM DEVELOPMENT
INCIDENT RESPONSE
REMEDIATION
SECURITY PLANNING
 
MANAGED SERVICES
UNIFIED THREAT MANAGEMENT
NETWORK INTRUSiON PREVENTION
LOG MANAGEMENT
FIREWALL
HOST INTRUSION PREVENTION
 
STAFFING SERVICES
PERFECT FIT PROGRAM
HIRING OPTIONS
 
       
 
Copyright © 2011 Infowire LLC, All rights reserved