SlideShare a Scribd company logo
Advanced Business Endpoint Protection
POWERING PREDICTIVE PREVENTION
Leveraging big data analytics and collective threat intelligence from our technology partners, our
threat intelligence platform identifies threats as they occur. This big data architecture continuously
processes, analyzes, correlates and contextualizes vast amounts of disparate information while also
applying a patented, fourth-generation machine learning and malicious code identification system to
create predictive behavioral determinations on malware instantly – with incredibly high accuracy.
Big data processing allows our Advanced Business Endpoint Protection to uncover malware as it
attempts to infect an individual user’s endpoint, while simultaneously protecting all other endpoints
against the same attacks. This collective approach to threat intelligence creates a massive real-time
malware detection net that has intimate knowledge of more than 300 million executables, including
their runtime behavioral characteristics and interactions. This, coupled with another 200+ terabytes of
threat data, ensures that our customers are always protected from both existing and new threats.
KEY SECURITY FEATURES
Advanced Business Endpoint Protection focuses on delivering a high-performance endpoint malware
prevention and management solution. It offers highly accurate and effective endpoint malware
prevention with a range of additional security protection capabilities that keep both the user and the
device safe.
Identity & Privacy Protection
These protections help users by assuming the endpoint is already infected by some completely
undetectable malware. They protect user information and transactional data that could be exposed
during online transactions from specific types of threats, including phishing, DNS poisoning, keystroke
logging, screen grabbing, cookie scraping, clipboard grabbing, and browser and session hijacking by
malicious software mounting man-in-the-browser or man-in-the-middle attacks. The protections lock
down the OS and browser to protect all user information and credentials – even shared passwords.
Multi-layered Defense
Multi-layered Defense incorporates several aspects of Threat Intelligence to help thwart threats early
on in their lifecycle – often before a threat researcher sees a single sample. It looks at the reputation of
the websites on individual visits and uses Threat Intelligence to determine their risk level. If the user
commonly visits low-reputation websites, then the endpoint goes into a state of heightened awareness
and closely interrogates any new files or processes that are introduced into their system. Multi-layered
Defense also interprets user behaviors and the overall safety level of the user. So, if a user is classified
as “high risk”, we then dynamically tunes malware prevention to that user, while preventing false
positives for less risky users.
Web Threat Protection
Our Web Threat Protection blocks access to known phishing sites and malicious domains by leveraging
Threat Intelligence to access the latest security intelligence on any website.
Firewall
In addition to its Protections, Advanced Business Endpoint Protection has its own intelligent system-
monitoring and application-aware outbound firewall. This sophisticated firewall protects users both
within and outside the corporate gateway, augmenting the Microsoft Windows® firewall to offer full
control of outbound and inbound connections without adding an unnecessary drain on endpoint
resources. It manages and monitors all outbound traffic to protect against “phone-home” threats and
ensures that only policy-approved applications communicate with the network. It also automatically
recognizes known good and bad programs, so users aren’t pestered with pop-ups or forced to make
uninformed judgments.
Heuristics
Heuristic settings can be adjusted based on risk tolerance for file execution. Heuristic settings include:
 Advanced – Analyzes new programs for suspicious actions that are typical of malware
 Age – Analyzes new programs based on the time a similar file has existed within Threat
Intelligence
 Popularity – Analyzes new programs based on how often a file is used or changed within Threat
Intelligence
Offline Protection
Stops attacks when an endpoint is offline with separate file execution policies applicable to local disk,
USB, CD, and DVD drives.
Virtualization, Terminal Server & Citrix Support
In addition to supporting Windows PC environments, Advanced Business Endpoint Protection also
supports Windows Server, Virtualization, Terminal Server and Citrix environments.
Mobile Smartphone and Tablet Support
Business Mobile Protection is available for Android™ and iOS® smartphones and tablets.
Resilient Distributed Cloud Architecture
Consists of multiple secure global data centers to support local offices and roaming users through their
nearest data center, providing full service resilience and redundancy.
Business Mobile Protection is available for Android™ and iOS® smartphones and tablets.
Resilient Distributed Cloud Architecture
Consists of multiple secure global data centers to support local offices and roaming users through their
nearest data center, providing full service resilience and redundancy.

More Related Content

What's hot

Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
A. Shamel
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 Cyd Isaak Francisco
 
Data base security and injection
Data base security and injectionData base security and injection
Data base security and injection
A. Shamel
 
10 critical elements of next generation of endpoint layered security
10 critical elements of next generation of endpoint layered security10 critical elements of next generation of endpoint layered security
10 critical elements of next generation of endpoint layered security
Jose Lopez
 
Ransomware
RansomwareRansomware
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
Kumawat Dharmpal
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security Risk
Dedi Dwianto
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
jayashri kolekar
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basicsSrinu Potnuru
 
Database Security
Database SecurityDatabase Security
Database Security
alraee
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
Zara Nawaz
 
OS Database Security Chapter 6
OS Database Security Chapter 6OS Database Security Chapter 6
OS Database Security Chapter 6AfiqEfendy Zaen
 
Red Team vs. Blue Team
Red Team vs. Blue TeamRed Team vs. Blue Team
Red Team vs. Blue Team
EC-Council
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
Kabul Education University
 

What's hot (19)

Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 
tarunidhar
tarunidhartarunidhar
tarunidhar
 
Data base security and injection
Data base security and injectionData base security and injection
Data base security and injection
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
10 critical elements of next generation of endpoint layered security
10 critical elements of next generation of endpoint layered security10 critical elements of next generation of endpoint layered security
10 critical elements of next generation of endpoint layered security
 
Iss lecture 1
Iss lecture 1Iss lecture 1
Iss lecture 1
 
Ransomware
RansomwareRansomware
Ransomware
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security Risk
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
 
Lect13 security
Lect13   securityLect13   security
Lect13 security
 
Database Security
Database SecurityDatabase Security
Database Security
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
OS Database Security Chapter 6
OS Database Security Chapter 6OS Database Security Chapter 6
OS Database Security Chapter 6
 
Red Team vs. Blue Team
Red Team vs. Blue TeamRed Team vs. Blue Team
Red Team vs. Blue Team
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 

Similar to Advanced Business Endpoint Protection

Endpoint security
Endpoint securityEndpoint security
Endpoint security
S.M. Towhidul Islam
 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security Solutions
The TNS Group
 
Product brochure-print-spread
Product brochure-print-spreadProduct brochure-print-spread
Product brochure-print-spread
Tran Thi Thuy Tuyet
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
NBBNOC
 
How to Protect Your Network from Firewall Hacking.docx
How to Protect Your Network from Firewall Hacking.docxHow to Protect Your Network from Firewall Hacking.docx
How to Protect Your Network from Firewall Hacking.docx
IT AMC Support Dubai - Techno Edge Systems LLC
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
MdZabedHossain2
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
ahmed53254
 
Different Types Of Network Security Devices And Tools.docx
Different Types Of Network Security Devices And Tools.docxDifferent Types Of Network Security Devices And Tools.docx
Different Types Of Network Security Devices And Tools.docx
SameerShaik43
 
Stay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus SoftwareStay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus Software
SoftwareDeals
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
Lumension
 
Cisco amp for networks
Cisco amp for networksCisco amp for networks
Cisco amp for networks
Cisco Canada
 
Product overview-eset-file-security
Product overview-eset-file-securityProduct overview-eset-file-security
Product overview-eset-file-security
Üstün Koruma
 
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdfHow Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
Webtrills1
 
What are the Different Types of Endpoint Security Solutions-converted.pdf
What are the Different Types of Endpoint Security Solutions-converted.pdfWhat are the Different Types of Endpoint Security Solutions-converted.pdf
What are the Different Types of Endpoint Security Solutions-converted.pdf
IT AMC Support Dubai - Techno Edge Systems LLC
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products MatrixCharles McNeil
 
Comodo advanced endpoint protection
Comodo advanced endpoint protectionComodo advanced endpoint protection
Comodo advanced endpoint protection
David Waugh
 
Trend Micro Antivirus.pdf
Trend Micro Antivirus.pdfTrend Micro Antivirus.pdf
Trend Micro Antivirus.pdf
Cloudtechtiq
 
Sophos intercept-x
Sophos intercept-xSophos intercept-x
Sophos intercept-x
Merrymary Tom
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
ANJUMOHANANU
 

Similar to Advanced Business Endpoint Protection (20)

Endpoint security
Endpoint securityEndpoint security
Endpoint security
 
Endpoint Security Solutions
Endpoint Security SolutionsEndpoint Security Solutions
Endpoint Security Solutions
 
Product brochure-print-spread
Product brochure-print-spreadProduct brochure-print-spread
Product brochure-print-spread
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
 
How to Protect Your Network from Firewall Hacking.docx
How to Protect Your Network from Firewall Hacking.docxHow to Protect Your Network from Firewall Hacking.docx
How to Protect Your Network from Firewall Hacking.docx
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Different Types Of Network Security Devices And Tools.docx
Different Types Of Network Security Devices And Tools.docxDifferent Types Of Network Security Devices And Tools.docx
Different Types Of Network Security Devices And Tools.docx
 
Stay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus SoftwareStay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus Software
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
Cisco amp for networks
Cisco amp for networksCisco amp for networks
Cisco amp for networks
 
Product overview-eset-file-security
Product overview-eset-file-securityProduct overview-eset-file-security
Product overview-eset-file-security
 
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdfHow Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
 
What are the Different Types of Endpoint Security Solutions-converted.pdf
What are the Different Types of Endpoint Security Solutions-converted.pdfWhat are the Different Types of Endpoint Security Solutions-converted.pdf
What are the Different Types of Endpoint Security Solutions-converted.pdf
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
 
Comodo advanced endpoint protection
Comodo advanced endpoint protectionComodo advanced endpoint protection
Comodo advanced endpoint protection
 
Trend Micro Antivirus.pdf
Trend Micro Antivirus.pdfTrend Micro Antivirus.pdf
Trend Micro Antivirus.pdf
 
Sophos intercept-x
Sophos intercept-xSophos intercept-x
Sophos intercept-x
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 

Recently uploaded

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 

Advanced Business Endpoint Protection

  • 1. Advanced Business Endpoint Protection POWERING PREDICTIVE PREVENTION Leveraging big data analytics and collective threat intelligence from our technology partners, our threat intelligence platform identifies threats as they occur. This big data architecture continuously processes, analyzes, correlates and contextualizes vast amounts of disparate information while also applying a patented, fourth-generation machine learning and malicious code identification system to create predictive behavioral determinations on malware instantly – with incredibly high accuracy. Big data processing allows our Advanced Business Endpoint Protection to uncover malware as it attempts to infect an individual user’s endpoint, while simultaneously protecting all other endpoints against the same attacks. This collective approach to threat intelligence creates a massive real-time malware detection net that has intimate knowledge of more than 300 million executables, including their runtime behavioral characteristics and interactions. This, coupled with another 200+ terabytes of threat data, ensures that our customers are always protected from both existing and new threats. KEY SECURITY FEATURES Advanced Business Endpoint Protection focuses on delivering a high-performance endpoint malware prevention and management solution. It offers highly accurate and effective endpoint malware prevention with a range of additional security protection capabilities that keep both the user and the device safe. Identity & Privacy Protection These protections help users by assuming the endpoint is already infected by some completely undetectable malware. They protect user information and transactional data that could be exposed during online transactions from specific types of threats, including phishing, DNS poisoning, keystroke logging, screen grabbing, cookie scraping, clipboard grabbing, and browser and session hijacking by malicious software mounting man-in-the-browser or man-in-the-middle attacks. The protections lock down the OS and browser to protect all user information and credentials – even shared passwords. Multi-layered Defense Multi-layered Defense incorporates several aspects of Threat Intelligence to help thwart threats early on in their lifecycle – often before a threat researcher sees a single sample. It looks at the reputation of the websites on individual visits and uses Threat Intelligence to determine their risk level. If the user commonly visits low-reputation websites, then the endpoint goes into a state of heightened awareness and closely interrogates any new files or processes that are introduced into their system. Multi-layered Defense also interprets user behaviors and the overall safety level of the user. So, if a user is classified
  • 2. as “high risk”, we then dynamically tunes malware prevention to that user, while preventing false positives for less risky users. Web Threat Protection Our Web Threat Protection blocks access to known phishing sites and malicious domains by leveraging Threat Intelligence to access the latest security intelligence on any website. Firewall In addition to its Protections, Advanced Business Endpoint Protection has its own intelligent system- monitoring and application-aware outbound firewall. This sophisticated firewall protects users both within and outside the corporate gateway, augmenting the Microsoft Windows® firewall to offer full control of outbound and inbound connections without adding an unnecessary drain on endpoint resources. It manages and monitors all outbound traffic to protect against “phone-home” threats and ensures that only policy-approved applications communicate with the network. It also automatically recognizes known good and bad programs, so users aren’t pestered with pop-ups or forced to make uninformed judgments. Heuristics Heuristic settings can be adjusted based on risk tolerance for file execution. Heuristic settings include:  Advanced – Analyzes new programs for suspicious actions that are typical of malware  Age – Analyzes new programs based on the time a similar file has existed within Threat Intelligence  Popularity – Analyzes new programs based on how often a file is used or changed within Threat Intelligence Offline Protection Stops attacks when an endpoint is offline with separate file execution policies applicable to local disk, USB, CD, and DVD drives. Virtualization, Terminal Server & Citrix Support In addition to supporting Windows PC environments, Advanced Business Endpoint Protection also supports Windows Server, Virtualization, Terminal Server and Citrix environments. Mobile Smartphone and Tablet Support Business Mobile Protection is available for Android™ and iOS® smartphones and tablets. Resilient Distributed Cloud Architecture Consists of multiple secure global data centers to support local offices and roaming users through their nearest data center, providing full service resilience and redundancy. Business Mobile Protection is available for Android™ and iOS® smartphones and tablets. Resilient Distributed Cloud Architecture Consists of multiple secure global data centers to support local offices and roaming users through their nearest data center, providing full service resilience and redundancy.