While signature-based anti-virus continues to be the primary endpoint protection mechanism in use today, there is a major shift occurring towards integrated threat management to enhance security.
Complicating the endpoint security equation further is the breakdown of client-server network architectures. As mainstream adoption of vitalization, mobile, wireless and remote access technologies force the traditional network perimeter to dissolve; the opportunity for worms and viruses to propagate has increased dramatically. In response, perimeter and network security capabilities are increasingly required on host endpoints.
- Layered security protection that optimizes defenses against intrusion, viruses, spyware, worms, Trojans, and other malicious zero-day exploits
- The ability to consolidate 5+ discrete endpoint security agents into 1
agent and reap significant administrative time savings in the process - Reduce system resource requirements by over 50% compared to the memory
footprint of maintaining 5+ discrete endpoint security products - Reduce endpoint security costs by over 50% by eliminating the licensing and support
costs associated with buying and maintaining multiple endpoint security products - Gain centralized policy control over applications, system resources, and removable
storage devices
Features and Benefits
Intrusion Prevention: Host based Intrusion Prevention provides protection where a vendor has not yet created signatures or patches to protect against vulnerabilities in their operating system or application. Block "zero-day" attacks that bypass traditional signature-based solutions, eliminating the need or use of specific attack signatures.
System Protection: Provides control over which applications are allowed to function by authorizing or denying program file execution. Registry Protection prevents specific registry settings from being modified, stopping malicious programs from infecting or modifying systems. Storage Protection prevents data leakage by regulating USB and Firewire storage devices.
Firewall Protection: Performs traditional firewall duties, allowing or denying traffic based on a set of predetermined rules. Monitor the source of network traffic in real time and only allows traffic from authorized applications, preventing unauthorized programs from making illegal outbound connections.
Virus and Spyware Protection: Provides complete signature and heuristics-based attack protection. Using patented sandbox technology, actively blocks malicious activity from being loaded into memory. Signatures provide an additional protection layer but it is not signature dependent and can stop new attacks as they are released without the need for updates.
Security Management Console: Combined with Security Management Console, the integrated solution provides event and state analysis capabilities along with security and compliance reporting. The Security Management Console integrates attack-related information with local and network vulnerability assessment data, providing a complete security picture.
Active X Protection: Active X protection is based on patent pending technology that blocks threats at the lowest common denominator attack vector. This occurs by interfacing with the ActiveX system itself and using heuristics, signatures, and identification of suspicious calls, provides 100% effectiveness at blocking illegal remote code execution.