1) Antimalware – Based on signature scanning and heuristic analysis (B-HAVE , ATC).
2) Advanced Anti Exploit – Catches the latest exploits in real time and mitigates memory corruption vulnerabilities that can evade other security solutions.
3) Risk Management – Helps to identify and remediate a large number of network and operating system risks on the endpoint level.
4) Firewall – Helps to protect endpoints from inbound and outbound unauthorized connections attempts.
5) Network Protection (with Content Control and Network Attack Defense) – Focused on detecting network attacks designed to gain access to endpoints through specific attacks i..e brute force, network exploits etc.
6) Device Control – Helps by preventing sensitive data leakage and malware infections via external devices attached to endpoints such as USB flash drives, Bluetooth devices, CD/DVD etc.
7) Web Filtering – Helps to schedule web access while blocking or allowing certain web categories or URLs.
8) Ransomware Mitigation – Ability to restore files encrypted in a ransomware attack from tamper-proof copies.
- Includes the following features
- Includes EDR capabilities (Core + ATS + EDR)
- Extended threat detection, focused investigations, and efficient response across endpoints, ensuring no digital threat goes unnoticed.
- Yearly subscription
Powered by WHMCompleteSolution