Endpoint Protection

  • Home
  • Endpoint Protection

Endpoint Protection

Today’s workplace is no longer confined by walls. Your users are connecting to your network remotely – from the home, airport, hotel, coffee shop, and many other places. Anti-virus/malware protection alone is only marginally effective, and firewalls are not properly located in order to provide protection for remote users who are directly accessing cloud applications and sensitive corporate data.

Our Endpoint Protection provides intelligence-led protection that secures all network traffic all the time from the cloud. Always-on protection uses the endpoint agent to secure users and devices by ensuring devices are always connected to our Cloud. All network traffic – not just web traffic – to and from the user device traverses highly performant and reliable network. This easy button for enterprise-grade security is deployed with a simple agent download and is centrally managed through a single cloud console. Features include:

Network Intrusion Prevention and Detection (IPS/IDS)

  • Examines network traffic flows to prevent and detect vulnerability exploits
  • Blocks network and application layer vulnerability exploits, buffers, overflows and reconnaissance activity to protect system data

Network Anti-Virus and Anti-Spyware

  • Examines network traffic to prevent and detect malware

Network URL Inspection and Filtering

  • Finds and removes millions of types of malware variants, such as Ransomware and other malicious software
  • Automated protections block access to malicious sites that deliver malware or steal credentials

Network IP Inspection and Filtering

  • Monitor and block known malicious IP addresses and high-risk IP addresses recently featured in trusted threat activity advisories

Zero-Day Packet Inspection and Threat Prevention

  • Automatically prevents highly evasive zero-day exploits and malware
  • Dynamic and static analysis, machine learning techniques, and bare metal analysis environment to detect and prevent evasive threats
  • Directly observes and executes unknown files in a virtualized sandbox environment within the secure platform