Features and Benefits

The following table outlines the key features and benefits provided by Worry-Free Business Security Services.

Feature

Benefit

Application Control

Application Control uses the kernel-level blocking method to block applications before execution on your corporate endpoints. Kernel-level blocking prevents applications from starting by blocking file access. This provides greater security, but may unexpectedly block or momentarily delay access to certain files needed by allowed applications.

Behavior Monitoring

Behavior Monitoring constantly monitors endpoints for unusual modifications to the operating system or on installed software.

Damage Cleanup Services

Damage Cleanup Services™ cleans computers of file-based and network viruses, and virus and worm remnants (Trojans, registry entries, viral files) through a fully-automated process. To address the threats and nuisances posed by Trojans, Damage Cleanup Services does the following:

  • Detects and removes live Trojans

  • Kills processes that Trojans create

  • Repairs system files that Trojans modify

  • Deletes files and applications that Trojans drop

Because Damage Cleanup Services runs automatically in the background, it is not necessary to configure it. Users are not even aware when it runs. However, Worry-Free Business Security Services may sometimes notify the user to restart their endpoint to complete the process of removing a Trojan.

Data Loss Prevention

Data Loss Prevention safeguards an organization's digital assets against accidental or deliberate leakage. Data Loss Prevention allows administrators to:

  • Identify the digital assets to protect

  • Create policies that limit or prevent the transmission of digital assets through common transmission channels, such as email messages and external devices

  • Enforce compliance to established privacy standards

Device Control

Device Control regulates access to external storage devices and network resources connected to endpoints. Device Control helps prevent data loss and leakage and, combined with file scanning, helps guard against security risks.

Endpoint Sensor

Endpoint Sensor is a powerful monitoring and investigation tool used to identify the presence, location, and entry point of threats. Through the use of detailed system event recording and historical analysis, you can perform preliminary investigations to discover hidden threats throughout your network and locate all affected endpoints. Generate root cause analysis reports to understand the nature and activity of the malware since the threat entered the endpoint.

Full Disk Encryption

Worry-Free Business Security Services provides you the ability to remotely trigger Microsoft BitLocker Drive Encryption and perform full disk encryption on managed Windows endpoints.

Firewall

The firewall can block or allow certain types of network traffic by creating a barrier between the client and the network. Additionally, the firewall will identify patterns in network packets that may indicate an attack on clients.

Predictive Machine Learning

The Predictive Machine Learning engine can protect your network from new, previously unidentified, or unknown threats through advanced file feature analysis and heuristic process monitoring. Predictive Machine Learning can ascertain the probability that a threat exists in a file and the probable threat type, protecting you from zero-day attacks.

Ransomware Protection

Enhanced scan features can identify and block ransomware programs that target documents that run on endpoints by identifying common behaviors and blocking processes commonly associated with ransomware programs.

Antivirus / Security Risk Protection

Worry-Free Business Security Services protects endpoints from security risks by scanning files and then performing a specific action for each security risk detected.

Worry-Free Business Security Services uses smart scan to make the scanning process more efficient. This technology works by off-loading a large number of signatures previously stored on the local endpoint to Smart Protection Sources. Using this approach, the system and network impact of the ever-increasing volume of signature updates to endpoint systems is significantly reduced.

Web Reputation

Web Reputation enhances protection against malicious websites. Web Reputation leverages Trend Micro's extensive web security database to check the reputation of URLs that Clients are attempting to access or URLs embedded in email messages that are contacting websites.