SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Security.Simplicity.Speed.
VIPRE Endpoint Security offers the most comprehensive protection while
still providing a light footprint and business-friendly architecture that
doesn’tslowyoudown.ThemostadvancedVIPREsolutionavailable,
it’s the ultimate security that guards against both known and unknown
threats.
VIPRE Endpoint Security Leading Features:
» Advanced Active Protection
» Removable device control and encryption
» Powerful antivirus for PCs and Macs
» Low CPU and memory usage
» Integrated patch management
» Mobile Device Management
» Cloud-enabled malicious URL blocking
» Email security and anti-phishing
» Firewall protection
Comprehensive Malware Defense
Mission #1 for your endpoint security solution is stopping malware. VIPRE
Endpoint Security accomplishes this through next-generation scanning
technology, always-on Advanced Active Protection, heuristics, signatures
and other sophisticated detection methods.
Integrated patch management ensures third-party PC software is up-
to-date and protected against exploit kits.
Cloud-enabled malicious URL blocking stops users from visiting
malicious or compromised websites serving malware.
Anti-phishing and email security keeps inboxes safe from malicious
attachments and phishing links.
Mobile Device Management secures Android devices from mobile
malware and provides the ability to locate, lock and wipe lost Android and
iOS devices.
Advanced Active Protection leverages the latest technology to go
beyond traditional techniques and detect new and emerging threats.
Device control manages data entering and leaving your users physical
ports and device types with enforceable encryption rules.
VIPRE Tops AV Charts
AV-Comparatives placed the new
VIPRE engine on top as a leader in
antivirus software.
Proven Protection
VIPRE malware defense is certified
by these leading testing authorities.
Easy Management Saves You Time
Easy to deploy and manage, VIPRE Endpoint Security frees you to focus your time and resources on more
strategic projects that move your business forward.
Incompatible software removal ensures smooth deployment of VIPRE by automatically removing
conflicting products.
Simplemanagementconsoleenablesyoutoquickly and easily manage allyour PCs and mobile devices,
deploy agents, patch systems, manage settings and pull reports from a central location.
VIPREroamingservicehelps you secure and centrally manage computersthat leavethe network or are
locatedinremoteofficesviaacloud-basedserviceusingsecureHTTPS protocols.
Unprotected computer identification alerts you to any machines accessing your network without
endpoint protection, helping you stop infections before they spread to file servers and systems.
Strong Protection and Performance
VIPRE is optimized for speed while providing the best endpoint threat protection – effectively proving that
speed and security do go together. Select the VIPRE solution that is right for you.
Business Premium Endpoint Security
Antivirus & anti-spyware • • •
Low CPU and memory usage • • •
In-browser threat scanning • • •
Removable device scanning • • •
Mobile Device Management • • •
Email security • • •
Patch management • • •
Anti-phishing • • •
Firewall • • •
Malicious website blocker • • •
Removabledevicecontroland
encryption
• • •
Advanced Active Protection • • •
© 2016 ThreatTrack Security, Inc. – ThreatTrack Security and the ThreatTrack Security logo are trademarks of ThreatTrack
Security, Inc. in Germany, USA, the United Kingdom and other countries. All product and company names herein may be
trademarks of their respective owners. Features are subject to change without notice. EPS_V1

Weitere ähnliche Inhalte

Was ist angesagt?

Stop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device ControlStop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device ControlSymantec
 
Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentationRasool Irfan
 
CyberArk Cleveland Defend Non-Human ID Exploitations
CyberArk Cleveland Defend Non-Human ID ExploitationsCyberArk Cleveland Defend Non-Human ID Exploitations
CyberArk Cleveland Defend Non-Human ID ExploitationsChad Bowerman
 
Software Security
Software SecuritySoftware Security
Software SecurityAkNirojan
 
What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?Mir Mustafa Ali
 
10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small Business10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small BusinessSYMBIONT, INC.
 
CyberArk Cleveland Defend Multi-Factor
CyberArk Cleveland Defend Multi-FactorCyberArk Cleveland Defend Multi-Factor
CyberArk Cleveland Defend Multi-FactorChad Bowerman
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMAlienVault
 
Computer Security
Computer SecurityComputer Security
Computer SecurityAkNirojan
 
Web application firewall
Web application firewallWeb application firewall
Web application firewallAju Thomas
 
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust NothingMark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust NothingPro Mrkt
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíMarketingArrowECS_CZ
 
Improve threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usmImprove threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usmAlienVault
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint ProtectionDan Buckley
 

Was ist angesagt? (19)

Stop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device ControlStop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device Control
 
Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentation
 
CyberArk Cleveland Defend Non-Human ID Exploitations
CyberArk Cleveland Defend Non-Human ID ExploitationsCyberArk Cleveland Defend Non-Human ID Exploitations
CyberArk Cleveland Defend Non-Human ID Exploitations
 
Managing and securing mobile devices
Managing and securing mobile devicesManaging and securing mobile devices
Managing and securing mobile devices
 
Unit4
Unit4Unit4
Unit4
 
Software Security
Software SecuritySoftware Security
Software Security
 
What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?
 
10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small Business10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small Business
 
CyberArk Cleveland Defend Multi-Factor
CyberArk Cleveland Defend Multi-FactorCyberArk Cleveland Defend Multi-Factor
CyberArk Cleveland Defend Multi-Factor
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Aensis idps 1000 v ext_eng
Aensis idps 1000  v ext_engAensis idps 1000  v ext_eng
Aensis idps 1000 v ext_eng
 
Web application firewall
Web application firewallWeb application firewall
Web application firewall
 
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust NothingMark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
 
Improve threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usmImprove threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usm
 
U nit 4
U nit 4U nit 4
U nit 4
 
IT network
IT networkIT network
IT network
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint Protection
 

Ähnlich wie New VIPRE_DS_EndpointSecurity_2016

withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfMdZabedHossain2
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfImamBahrudin5
 
Different Types Of Network Security Devices And Tools.docx
Different Types Of Network Security Devices And Tools.docxDifferent Types Of Network Security Devices And Tools.docx
Different Types Of Network Security Devices And Tools.docxSameerShaik43
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint ProtectionDan Buckley
 
Advanced business endpoint protection (1)
Advanced business endpoint protection (1)Advanced business endpoint protection (1)
Advanced business endpoint protection (1)Dan Buckley
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptxNBBNOC
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqriteseo
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdfMetaorange
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdfahmed53254
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server securityxband
 

Ähnlich wie New VIPRE_DS_EndpointSecurity_2016 (20)

withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
Different Types Of Network Security Devices And Tools.docx
Different Types Of Network Security Devices And Tools.docxDifferent Types Of Network Security Devices And Tools.docx
Different Types Of Network Security Devices And Tools.docx
 
What are the Different Types of Endpoint Security Solutions-converted.pdf
What are the Different Types of Endpoint Security Solutions-converted.pdfWhat are the Different Types of Endpoint Security Solutions-converted.pdf
What are the Different Types of Endpoint Security Solutions-converted.pdf
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint Protection
 
Advanced business endpoint protection (1)
Advanced business endpoint protection (1)Advanced business endpoint protection (1)
Advanced business endpoint protection (1)
 
Ericom Shield datasheet
Ericom Shield datasheetEricom Shield datasheet
Ericom Shield datasheet
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
 
Endpoint security
Endpoint securityEndpoint security
Endpoint security
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 

New VIPRE_DS_EndpointSecurity_2016

  • 1. Security.Simplicity.Speed. VIPRE Endpoint Security offers the most comprehensive protection while still providing a light footprint and business-friendly architecture that doesn’tslowyoudown.ThemostadvancedVIPREsolutionavailable, it’s the ultimate security that guards against both known and unknown threats. VIPRE Endpoint Security Leading Features: » Advanced Active Protection » Removable device control and encryption » Powerful antivirus for PCs and Macs » Low CPU and memory usage » Integrated patch management » Mobile Device Management » Cloud-enabled malicious URL blocking » Email security and anti-phishing » Firewall protection Comprehensive Malware Defense Mission #1 for your endpoint security solution is stopping malware. VIPRE Endpoint Security accomplishes this through next-generation scanning technology, always-on Advanced Active Protection, heuristics, signatures and other sophisticated detection methods. Integrated patch management ensures third-party PC software is up- to-date and protected against exploit kits. Cloud-enabled malicious URL blocking stops users from visiting malicious or compromised websites serving malware. Anti-phishing and email security keeps inboxes safe from malicious attachments and phishing links. Mobile Device Management secures Android devices from mobile malware and provides the ability to locate, lock and wipe lost Android and iOS devices. Advanced Active Protection leverages the latest technology to go beyond traditional techniques and detect new and emerging threats. Device control manages data entering and leaving your users physical ports and device types with enforceable encryption rules. VIPRE Tops AV Charts AV-Comparatives placed the new VIPRE engine on top as a leader in antivirus software. Proven Protection VIPRE malware defense is certified by these leading testing authorities.
  • 2. Easy Management Saves You Time Easy to deploy and manage, VIPRE Endpoint Security frees you to focus your time and resources on more strategic projects that move your business forward. Incompatible software removal ensures smooth deployment of VIPRE by automatically removing conflicting products. Simplemanagementconsoleenablesyoutoquickly and easily manage allyour PCs and mobile devices, deploy agents, patch systems, manage settings and pull reports from a central location. VIPREroamingservicehelps you secure and centrally manage computersthat leavethe network or are locatedinremoteofficesviaacloud-basedserviceusingsecureHTTPS protocols. Unprotected computer identification alerts you to any machines accessing your network without endpoint protection, helping you stop infections before they spread to file servers and systems. Strong Protection and Performance VIPRE is optimized for speed while providing the best endpoint threat protection – effectively proving that speed and security do go together. Select the VIPRE solution that is right for you. Business Premium Endpoint Security Antivirus & anti-spyware • • • Low CPU and memory usage • • • In-browser threat scanning • • • Removable device scanning • • • Mobile Device Management • • • Email security • • • Patch management • • • Anti-phishing • • • Firewall • • • Malicious website blocker • • • Removabledevicecontroland encryption • • • Advanced Active Protection • • • © 2016 ThreatTrack Security, Inc. – ThreatTrack Security and the ThreatTrack Security logo are trademarks of ThreatTrack Security, Inc. in Germany, USA, the United Kingdom and other countries. All product and company names herein may be trademarks of their respective owners. Features are subject to change without notice. EPS_V1