Security for Endpoints

Security service for physical workstations, embedded devices and servers delivered by the GravityZone On Premise consol

 * Protection for any number of physical endpoints: Windows, Linux and Mac   *

 * Best performance and protection*

 *  Smart Scanning - centralized scanning offloads security tasks to Security Virtual Appliances*

Key Benefits

 *  Easy to deploy accelerates implementation and lowers cost

Delivered as a Linux Ubuntu self-configuring hardened virtual appliance, integrates with VMware vCenter, Citrix XenServer, and Active Directory .

* Simplified security management
 

GravityZone Security for Endpoints simplifies security operations, reduces the time required to manage and maintain security operations and further streamlines security management workflows

* High availability and performance .

GravityZone Security for Endpoints is delivered within a virtual appliance with built-in redundancy to minimize risks and performance issues when managing large environments, and drastically reduces the manual effort and hardware needed to maintain an enterprise-wide security system

* Breakthrough resource optimization for physical machines

Security offloading for all types of endpoints in laptops and desktops .

* Scalable and resilient security

Eliminates single point of failure and AV storms; grows organically by cloning virtual appliances and automating deployment with golden images.

* Wide operating system coverage

Windows Workstation, Embedded, Server, Mac and major Linux distributions .

 

Key Features

* Smart Scanning - centralized scanning offloads security tasks to Security Virtual Appliances.

* Environment-aware security agent .

* Integration with Microsoft Active Directory

* Intelligent deployment .

* Multiple layers of security for endpoints: antivirus and antimalware with behavioral monitoring, zero-day threat protection, application control and sandboxing, firewall, device control and content control .

* Policy Inheritance .

Different security policies can be adapted based on employee roles in the company, they are available when there is an Active Directory integration and are applied when the user logs in .

* Endpoint staging

Enables the administrator to save time when creating new policies by using ones that are already crea .

* Antimalware

Antimalware, Antivirus, Antispyware, Antiphishing, Trojan & Rootkit detection.

* Firewall

Fully featured two-way personal firewall and host-based intrusion detection and prevention HIDS / HIPS .

* Content Control

Multiple thread filtering of web content to identify potential online threats .

* Device Control

Port and device control to enforce data protection policies .

* Location-aware policies

Security policies that adapt as users take their systems outside the company .

* ( User-aware policies (on-premise console

Different security policies can be adapted based on employee roles in the company, they are available when there is an Active Directory integration and are applied when the user logs in .