Application Control
|
Application Control uses the kernel-level blocking method to block
applications before execution on your corporate endpoints. Kernel-level blocking prevents
applications from starting by blocking file access. This provides greater security,
but may
unexpectedly block or momentarily delay access to certain files needed by allowed
applications.
|
Behavior Monitoring
|
Behavior Monitoring constantly monitors endpoints for unusual
modifications to the operating system or on installed software.
|
Damage Cleanup Services
|
Damage Cleanup Services™
cleans computers of file-based and network
viruses, and virus and worm remnants (Trojans, registry entries, viral files) through
a
fully-automated process. To address the threats and nuisances posed by Trojans, Damage Cleanup Services does the following:
-
Detects and removes live Trojans
-
Kills processes that Trojans create
-
Repairs system files that Trojans modify
-
Deletes files and applications that Trojans drop
Because Damage Cleanup Services runs automatically in the
background, it is not necessary to configure it. Users are not even aware when it
runs.
However, Worry-Free Services may sometimes
notify the user to restart their endpoint to complete the process of removing a Trojan.
|
Data Loss Prevention
|
Data Loss Prevention safeguards an organization's digital assets
against accidental or deliberate leakage. Data Loss Prevention allows administrators
to:
-
Identify the digital assets to protect
-
Create policies that limit or prevent the transmission of digital
assets through common transmission channels, such as email messages and external
devices
-
Enforce compliance to established privacy standards
|
Device Control
|
Device Control
regulates access to external storage devices and network resources connected to endpoints.
Device Control helps prevent data loss and leakage and, combined with file scanning,
helps
guard against security risks.
|
Endpoint Sensor
|
Endpoint Sensor is a powerful monitoring and investigation tool used to identify the
presence, location, and entry point of threats. Through the use of detailed system
event
recording and historical analysis, you can perform preliminary investigations to discover
hidden threats throughout your network and locate all affected endpoints. Generate
root
cause analysis reports to understand the nature and activity of the malware since
the threat
entered the endpoint.
|
Full Disk Encryption
|
Worry-Free Services provides
you the ability to remotely trigger Microsoft BitLocker Drive Encryption and perform
full
disk encryption on managed Windows endpoints.
|
Firewall
|
The firewall can block or allow certain types of network traffic by creating a
barrier between the client and the network. Additionally, the firewall will identify
patterns in
network packets that may indicate an attack on clients.
|
Predictive Machine Learning
|
The Predictive Machine Learning engine can protect your network from new,
previously unidentified, or unknown threats through advanced file feature analysis
and
heuristic process monitoring. Predictive Machine Learning can ascertain the probability
that
a threat exists in a file and the probable threat type, protecting you from zero-day
attacks.
|
Ransomware Protection
|
Enhanced scan features can identify and block ransomware programs that
target documents that run on endpoints by identifying common behaviors and blocking
processes commonly associated with ransomware programs.
|
Antivirus / Security Risk Protection
|
Worry-Free Services protects
endpoints from security risks by scanning files and then performing a specific action
for
each security risk detected.
Worry-Free Services uses smart scan to make the scanning process more efficient. This
technology works by off-loading a large number of signatures previously stored on
the local
endpoint to Smart Protection Sources. Using this approach, the system and network
impact of
the ever-increasing volume of signature updates to endpoint systems is significantly
reduced.
|
Web Reputation
|
Web Reputation enhances protection against malicious websites. Web
Reputation leverages Trend Micro's extensive web security database to check the
reputation of URLs that Clients are attempting to access or URLs embedded in email
messages that are contacting websites.
|