Endpoint Security

Terminal Security

Effective protection of terminal devices is the most important security process

NextGen Antimalware Protection

A good anti-malware system such as viruses, trojans, worms, spyware, exploits, ransomware and potentially unintended applications (PUA – Potentially Unwanted Applications) at the terminal level is necessary to provide effective protection since many of the computers continuously outside the perimeter security systems.

Device Testing, Data Classification and Control

External DLPs and Data Loss Prevention (DLP) help reduce the risk of loss of data from sensitive data leak (DLP) attempts such as personal data or confidential corporate documents while providing full control of removable devices such as USB keys, portable hard drives, and wireless networking devices.

Web and Application Control

Terminal security systems can stop online threats and keep users safe from malicious websites while allowing for control of all applications even if the terminals are out of bounds.

NextGen Antimalware Protection

A good anti-malware protection at the terminal level is absolutely necessary to ensure effective protection, ensuring that all computers will remain free of viruses, trojans, worms, spyware, exploits, ransomware, and potentially unwanted applications (PUA – Potentially Unwanted Applications ) even if they are outside the perimeter security systems.

Threats have become much more complex lately, so we are entering a new era in the protection of terminals since protection systems are now essential to have next-generation technologies such as signatureless, anti-exploit and anti-ransomware to prevent and clean malware is really sophisticated and overcomes traditional methods very easily and permeates any protection measure.

Details

  • Common Management Console that gives a snapshot of the security status of each computer
  • Reduce Installation Time to manage, update, and implement security policy on computers
  • Preventive Troubleshooting Operating System, allowing communication only in approved applications if necessary
  • Checksum Control Technology that prevents attacks against applications and impersonation
  • Next-generation technologies to protect against sophisticated 0-day threats that are not yet known
  • Special technologies to prevent ransomware
  • Root-cause analysis (root-cause analysis)

Device and Data Control, Data Classification

External DLPs and Data Loss Prevention (DLP) help reduce the risk of loss of data from sensitive data leak (DLP) attempts such as personal data or confidential corporate documents while providing full control of removable devices such as USB keys, portable hard drives, and wireless networking devices.

 

In addition, through data classification, Data Loss Prevention (DLP) systems have impressive results as it becomes known immediately whether a file has leaked out of the perimeter into a detachable storage medium so the company is in a position to properly manage its data, that is to say, its property. Especially because of the new provisions coming into operation very soon in Europe, the above safeguards are the minimum that companies have to apply in order not to be surprised with the great consequences of mismanagement of personal data.

Details

  • Detection or Prohibition of Unauthorized Use of Removable Storage Devices, Media Drives, and Wireless Network Protocols
  • Authorize Specific USB Devices for High Level Executives and Ban Usage for Any Other
  • Prevent Sensitive Data Leak (DLP) from removable devices, browsers, instant messengers, and other applications
  • Data Protection including bank accounts, social security numbers, etc. through a specific classification of data (data classification)
  • Automatic file sorting capabilities based on special rules
  • Locate or Disable file transfer with system prompts to the user
  • End User Controls in System Prompts in a central management console

Web and Application Control

The internet is the main source of spreading malware and threats that become increasingly complex and advanced every day. Continuous technological developments have shaped a new digital world that has revolutionized our society. Nowadays, the terminals are constantly outside the perimeter of the business so in order to be sure that the company is safe when they return, there should be high-level local protection and the ability to update systems in the company if something changes in their situation.

Modern terminal security systems can stop online threats and keep users safe from malicious websites and also application control allows control of all applications that can cause security or legal issues even if the terminals are out of bounds.

Details

  • Advanced automatic detection of malicious web pages on the terminal
  • URL filter for instant protection against malicious websites that the business wants
  • Support all browsers (IE, Firefox, Safari, Chrome, Opera)
  • Easily detect thousands of applications in many different categories with constant updates
  • Easily standardize a common browser or software restriction that can cause a problem for the company for various reasons such as P2P, Torrent, and so on.
  • Possibility to change policy even if the terminals are outside the company