Next-Gen Endpoint Security
Enpoint Security
Provides prevention and detection of attacks across all major vectors, rapid elimination of threats with fully automated, policy-driven response capabilities, and complete visibility into the endpoint environment with full-context, real-time forensics. The innovative security solutions offer broad protection against diverse modes of attack, including malware, exploits, and live/insider attacks. Malware attacks protection includes executables such as Trojans, malware, worms, backdoors, payload-based Fileless- Memory-only malware, no-disk-based indicators, and fileless attacks such as memory-only malware, no-disk-based indicators. Exploit attacks include exploits rooted in Office documents, Adobe files, macros, spear phishing emails as well as drive-by downloads, Flash, Java, Javascript, VBS, IFrame/HTML5, plug-ins. Live/insider attacked include Powershell, WMI, PowerSploit, VBS, Mimikatz, credentials scraping, and tokens.
Endpoint Security Complete also adds advanced capabilities such as threat hunting and Deep Visibility. It provides prevention and detection of attacks across all major vectors, rapid elimination of threats with fully automated, policy-driven response capabilities, and complete visibility into the endpoint environment with full-context, real-time forensics. Endpoint Security includes Advanced EDR/Threat Hunting, which provides the ability to search for attack indicators, investigate existing incidents, perform file integrity monitoring, and root out hidden threats. It includes an Attack Storyline, a visual diagram representing an execution flow, helping IR teams to quickly evaluate the impact of any threat. Advanced capabilities include Deep Visibility into every event on the agent, including the ability to search for historic data, and visibility into the encrypted network traffic without pushing certificates or the need for expensive SSL appliances/blades. Endpoint Security has broader Device Control capabilities, including firewall control, which enables the management of the personal firewall on your endpoints.