{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"comparison":{"compare":{"ru":"Сравнить","_type":"localeString","en":"Compare"},"characteristics":{"ru":"Характеристики","_type":"localeString","en":"Characteristics"},"additional_template":{"ru":"Дополнительные характеристики","_type":"localeString","en":"Additional characteristics"},"nothing_to_show":{"en":"No data to compare","ru":"Нет данных для отображения","_type":"localeString"}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"en":"Sign out","ru":"Выйти","_type":"localeString"},"faq":{"ru":"FAQ","_type":"localeString","en":"FAQ","de":"FAQ"},"references":{"ru":"Мои запросы","_type":"localeString","en":"Requests","de":"References"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"_type":"localeString","en":"ROI calculators","ru":"ROI калькуляторы"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"catalogs":{"en":"Catalogs","ru":"Каталоги","_type":"localeString"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"_type":"localeString","en":"Deals","ru":"Сделки"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"_type":"localeString","en":"Are you sure you want to delete","ru":"Подтвердите удаление"},"search-placeholder":{"en":"Enter your search term","ru":"Введите поисковый запрос","_type":"localeString"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"en":"About Us","_type":"localeString"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"en":"Make online presentations","_type":"localeString"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"ru":"Все права защищены","_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten"},"company":{"ru":"О компании","_type":"localeString","en":"My Company","de":"Über die Firma"},"about":{"_type":"localeString","en":"About us","de":"Über uns","ru":"О нас"},"infocenter":{"ru":"Инфоцентр","_type":"localeString","en":"Infocenter","de":"Infocenter"},"tariffs":{"_type":"localeString","en":"Subscriptions","de":"Tarife","ru":"Тарифы"},"contact":{"en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString"},"marketplace":{"en":"Marketplace","de":"Marketplace","ru":"Marketplace","_type":"localeString"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare","de":"Wähle und vergleiche"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString"},"salestools":{"_type":"localeString","en":"Salestools","de":"Salestools","ru":"Salestools"},"automatization":{"_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов"},"roi_calcs":{"_type":"localeString","en":"ROI calculators","de":"ROI-Rechner","ru":"ROI калькуляторы"},"matrix":{"_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения"},"b4r":{"en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"_type":"localeString","en":"Privacy Policy","ru":"Политика конфиденциальности"},"user_agreement":{"_type":"localeString","en":"Agreement","ru":"Пользовательское соглашение "},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"quote":{"_type":"localeString","en":"Price calculator","ru":"Калькулятор цены"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"_type":"localeString","en":"4 vendors","ru":"поставщикам"},"blog":{"en":"blog","ru":"блог","_type":"localeString"},"pay4content":{"_type":"localeString","en":"we pay for content","ru":"платим за контент"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"_type":"localeString","en":"Email","ru":"Email"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString"},"subscribe__agree-label":{"en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString"},"subscribe__submit-label":{"en":"Subscribe","ru":"Подписаться","_type":"localeString"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"en":"username@gmail.com","ru":"username@gmail.com","_type":"localeString"},"subscribe__name-placeholder":{"en":"Last, first name","ru":"Имя Фамилия","_type":"localeString"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"_type":"localeString","en":"Home","ru":"Главная"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"en":"Registration","ru":"Регистрация","_type":"localeString"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"en":"Leave comment","ru":"Оставить комментарий","_type":"localeString"},"firstname":{"en":"First name","ru":"Имя","_type":"localeString"},"lastname":{"_type":"localeString","en":"Last name","ru":"Фамилия"},"company":{"en":"Company name","ru":"Компания","_type":"localeString"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"_type":"localeString","en":"Actual cost","ru":"Фактическая стоимость"},"received-roi":{"en":"Received ROI","ru":"Полученный ROI","_type":"localeString"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"en":"Send","ru":"Отправить","_type":"localeString"},"required-message":{"_type":"localeString","en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}}},"translationsStatus":{"comparison":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"comparison":{"title":{"_type":"localeString","en":"Compare products","ru":"Сравнить продукты"}}},"pageMetaDataStatus":{"comparison":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{"36":{"id":36,"title":"Endpoint Security","characteristics":[{"id":533,"title":"Anti-malware","required":0,"type":"binary"},{"id":535,"title":"File Reputation Scanning","required":0,"type":"binary"},{"id":537,"title":"URL filtering","required":0,"type":"binary"},{"id":539,"title":"HIPS","required":0,"type":"binary"},{"id":541,"title":"Firewall","required":0,"type":"binary"},{"id":543,"title":"Sandbox","required":0,"type":"select"},{"id":545,"title":"User behavior Analytics","required":0,"type":"binary"},{"id":547,"title":"Application Control","required":0,"type":"binary"},{"id":549,"title":"Device & Port Control","required":0,"type":"select"},{"id":551,"title":"Application Vulnerability Managment","required":0,"type":"binary"},{"id":553,"title":"Data Loss Prevention","required":0,"type":"select"},{"id":555,"title":"Device Configuration Management","required":0,"type":"select"},{"id":557,"title":"Disk Encryption","required":0,"type":"binary"},{"id":559,"title":"File Encryption","required":0,"type":"binary"},{"id":561,"title":"Windows support","required":0,"type":"binary"},{"id":563,"title":"Linux support","required":0,"type":"binary"},{"id":565,"title":"MS Sharepoint support","required":0,"type":"binary"},{"id":567,"title":"MS Exchange Support","required":0,"type":"binary"},{"id":569,"title":"IBM Lotus Domino support","required":0,"type":"binary"},{"id":571,"title":"Unix Support","required":0,"type":"binary"},{"id":573,"title":"Mac OS X Support","required":0,"type":"binary"},{"id":575,"title":"Android Support","required":0,"type":"binary"},{"id":577,"title":"iOS Support","required":0,"type":"binary"},{"id":579,"title":"Windows Mobile Support","required":0,"type":"binary"},{"id":582,"title":"Vmware support","required":0,"type":"select"},{"id":585,"title":"Huper-V Support","required":0,"type":"binary"},{"id":587,"title":"Citrix Support","required":0,"type":"binary"},{"id":589,"title":"Windows Server Support","required":0,"type":"binary"},{"id":591,"title":"Patch Management","required":0,"type":"binary"},{"id":593,"title":"Threat Intelligence Feeds","required":0,"type":"select"},{"id":595,"title":"SIEM","required":0,"type":"select"},{"id":599,"title":"Endpoint Management","required":0,"type":"binary"},{"id":597,"title":"NAC","required":0,"type":"binary"}]}},"comparisonByTemplateId":{},"products":[{"id":1730,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/ESET_ENDPOINT_PROTECTION_ADVANCED.png","logo":true,"scheme":false,"title":"ESET Endpoint Protection advanced","vendorVerified":0,"rating":"1.80","implementationsCount":4,"suppliersCount":0,"alias":"eset-endpoint-protection-advanced","companyTypes":[],"description":"<span style=\"font-weight: bold;\">ESET Endpoint Protection Advanced</span> Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r\n<ul> <li>Protection against targeted attacks</li> <li>Protection against ransomware</li> <li>Prevention of fileless attacks</li> <li>Remote management</li> </ul>\r\n<span style=\"font-weight: bold;\">Endpoint security</span> ESET’s endpoint protection solutions leverage multilayered technologies in dynamic equilibrium to constantly balance performance, detection and false positives. <span style=\"font-weight: bold;\">File server security</span> Provides advanced protection to all network file storage, general servers and multi-purpose servers. Ensures servers are stable and conflict-free. Limits restarts and maintenance windows to a minimum to guarantee business continuity. <span style=\"font-weight: bold;\">Manage products via on-premise console</span> ESET Security Management Center is an easy to use management console. It provides real-time visibility for on-premise and off premise endpoints as well as full reporting for ESET solutions on all OSes. All these features are managed from one single pane of glass.\r\n<ul> <li>Complete network visibility</li> <li>Full security management</li> <li>Flexible reporting</li> <li>Automated security management</li> </ul>\r\n<span style=\"font-style: italic;\">"ESET was just what we were looking for – light processing power, reliable protection and cost scalable, yet easy to deploy and manage centrally." - Richard Ford, Head of IT at SWFC</span>","shortDescription":"ESET ENDPOINT PROTECTION ADVANCED is a complete multilayered protection with remote security management: On-premise management, endpoint security, file server security\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ESET Endpoint Protection advanced","keywords":"","description":"<span style=\"font-weight: bold;\">ESET Endpoint Protection Advanced</span> Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r\n<ul> <li>Protection against targeted attacks</li> <li>Protection aga","og:title":"ESET Endpoint Protection advanced","og:description":"<span style=\"font-weight: bold;\">ESET Endpoint Protection Advanced</span> Multilayered technology, machine learning and human expertise combined with automated security management. Provides:\r\n<ul> <li>Protection against targeted attacks</li> <li>Protection aga","og:image":"https://old.roi4cio.com/fileadmin/user_upload/ESET_ENDPOINT_PROTECTION_ADVANCED.png"},"eventUrl":"","translationId":1731,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"36":{"533":{"id":1897,"characteristicId":533,"templateId":36,"value":true},"535":{"id":1898,"characteristicId":535,"templateId":36,"value":true},"537":{"id":1899,"characteristicId":537,"templateId":36,"value":true},"539":{"id":1900,"characteristicId":539,"templateId":36,"value":true},"541":{"id":1901,"characteristicId":541,"templateId":36,"value":true},"543":{"id":1902,"characteristicId":543,"templateId":36,"value":"YES"},"545":{"id":1903,"characteristicId":545,"templateId":36,"value":"N/A"},"547":{"id":1904,"characteristicId":547,"templateId":36,"value":true},"549":{"id":1905,"characteristicId":549,"templateId":36,"value":"N/A"},"551":{"id":1906,"characteristicId":551,"templateId":36,"value":true},"553":{"id":1907,"characteristicId":553,"templateId":36,"value":"N/A"},"555":{"id":1908,"characteristicId":555,"templateId":36,"value":"N/A"},"557":{"id":1909,"characteristicId":557,"templateId":36,"value":"N/A"},"559":{"id":1910,"characteristicId":559,"templateId":36,"value":"N/A"},"561":{"id":1911,"characteristicId":561,"templateId":36,"value":true},"563":{"id":1912,"characteristicId":563,"templateId":36,"value":true},"565":{"id":1913,"characteristicId":565,"templateId":36,"value":"N/A"},"567":{"id":1914,"characteristicId":567,"templateId":36,"value":"N/A"},"569":{"id":1915,"characteristicId":569,"templateId":36,"value":"N/A"},"571":{"id":1916,"characteristicId":571,"templateId":36,"value":"N/A"},"573":{"id":1917,"characteristicId":573,"templateId":36,"value":true},"575":{"id":1918,"characteristicId":575,"templateId":36,"value":true},"577":{"id":1919,"characteristicId":577,"templateId":36,"value":"N/A"},"579":{"id":1920,"characteristicId":579,"templateId":36,"value":"N/A"},"582":{"id":1921,"characteristicId":582,"templateId":36,"value":"N/A"},"585":{"id":1922,"characteristicId":585,"templateId":36,"value":"N/A"},"587":{"id":1923,"characteristicId":587,"templateId":36,"value":"N/A"},"589":{"id":1924,"characteristicId":589,"templateId":36,"value":true},"591":{"id":1925,"characteristicId":591,"templateId":36,"value":"N/A"},"593":{"id":1926,"characteristicId":593,"templateId":36,"value":"N/A"},"595":{"id":1927,"characteristicId":595,"templateId":36,"value":"N/A"},"597":{"id":1929,"characteristicId":597,"templateId":36,"value":"N/A"},"599":{"id":1928,"characteristicId":599,"templateId":36,"value":true}}}},{"id":1732,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/McAfee__logo_.jpg","logo":true,"schemeURL":"https://old.roi4cio.com/fileadmin/user_upload/Endpoint_Protection.png","scheme":true,"title":"McAfee Endpoint Security","vendorVerified":1,"rating":"2.80","implementationsCount":5,"suppliersCount":0,"alias":"mcafee-endpoint-security","companyTypes":[],"description":"Advanced, consolidated endpoint defense <span style=\"font-weight: bold;\">McAfee Endpoint Security</span> delivers industry-leading protection and operational simplicity for your diverse endpoint environment. Core threat prevention Essential anti-virus, exploit prevention, firewall, and web control communicate with each other. Machine learning State-of-the art techniques identify malicious code based on appearance and behavior. Application containment Limit the impact of suspicious files and zero-day malware by blocking behaviors and containing them before they can infect or spread in your environment. Endpoint detection and response Our integrated, automated, and adaptable endpoint detection and response (EDR) technology is easy to use and makes incident response as simple as a single click.\r\n<span style=\"font-weight: bold;\">Product features</span>\r\n<ul><li>Centralized management. The McAfee ePolicy Orchestrator management console can be deployed on premises or in the cloud. It provides greater visibility, simplifies operations, boosts IT productivity, unifies security, and reduces costs.</li><li>Advanced anti-malware protection. Our anti-malware engine is continually updated by McAfee Global Threat Intelligence and works efficiently across multiple operating systems.</li><li>Machine learning analysis. Detect zero-day threats in near real time by examining how they look and behave to halt threats designed to evade detection.</li><li>Dynamic application containment. Defend against ransomware and greyware by securing endpoints that are leveraged as entry points for attacks.</li><li>Proactive web security. Ensure safe browsing with web protection and filtering for endpoints.</li><li>Actionable threat forensics. Quickly see where infections are, why they are occurring, and the length of exposure to understand the threat and react more quickly.</li></ul>","shortDescription":"McAfee Endpoint Security is an integrated, centrally managed, advanced defenses","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Endpoint Security","keywords":"","description":"Advanced, consolidated endpoint defense <span style=\"font-weight: bold;\">McAfee Endpoint Security</span> delivers industry-leading protection and operational simplicity for your diverse endpoint environment. Core threat prevention Essential anti-virus, exploit","og:title":"McAfee Endpoint Security","og:description":"Advanced, consolidated endpoint defense <span style=\"font-weight: bold;\">McAfee Endpoint Security</span> delivers industry-leading protection and operational simplicity for your diverse endpoint environment. Core threat prevention Essential anti-virus, exploit","og:image":"https://old.roi4cio.com/fileadmin/user_upload/McAfee__logo_.jpg"},"eventUrl":"","translationId":1733,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"36":{"533":{"id":1963,"characteristicId":533,"templateId":36,"value":true},"535":{"id":1964,"characteristicId":535,"templateId":36,"value":true},"537":{"id":1965,"characteristicId":537,"templateId":36,"value":true},"539":{"id":1966,"characteristicId":539,"templateId":36,"value":true},"541":{"id":1967,"characteristicId":541,"templateId":36,"value":true},"543":{"id":1968,"characteristicId":543,"templateId":36,"value":"YES"},"545":{"id":1969,"characteristicId":545,"templateId":36,"value":"N/A"},"547":{"id":1970,"characteristicId":547,"templateId":36,"value":"N/A"},"549":{"id":1971,"characteristicId":549,"templateId":36,"value":"N/A"},"551":{"id":1972,"characteristicId":551,"templateId":36,"value":"N/A"},"553":{"id":1973,"characteristicId":553,"templateId":36,"value":"N/A"},"555":{"id":1974,"characteristicId":555,"templateId":36,"value":"N/A"},"557":{"id":1975,"characteristicId":557,"templateId":36,"value":"N/A"},"559":{"id":1976,"characteristicId":559,"templateId":36,"value":"N/A"},"561":{"id":1977,"characteristicId":561,"templateId":36,"value":true},"563":{"id":1978,"characteristicId":563,"templateId":36,"value":"N/A"},"565":{"id":1979,"characteristicId":565,"templateId":36,"value":"N/A"},"567":{"id":1980,"characteristicId":567,"templateId":36,"value":"N/A"},"569":{"id":1981,"characteristicId":569,"templateId":36,"value":"N/A"},"571":{"id":1982,"characteristicId":571,"templateId":36,"value":"N/A"},"573":{"id":1983,"characteristicId":573,"templateId":36,"value":"N/A"},"575":{"id":1984,"characteristicId":575,"templateId":36,"value":"N/A"},"577":{"id":1985,"characteristicId":577,"templateId":36,"value":"N/A"},"579":{"id":1986,"characteristicId":579,"templateId":36,"value":"N/A"},"582":{"id":1987,"characteristicId":582,"templateId":36,"value":"N/A"},"585":{"id":1988,"characteristicId":585,"templateId":36,"value":"N/A"},"587":{"id":1989,"characteristicId":587,"templateId":36,"value":"N/A"},"589":{"id":1990,"characteristicId":589,"templateId":36,"value":true},"591":{"id":1991,"characteristicId":591,"templateId":36,"value":"N/A"},"593":{"id":1992,"characteristicId":593,"templateId":36,"value":"N/A"},"595":{"id":1993,"characteristicId":595,"templateId":36,"value":"N/A"},"597":{"id":1995,"characteristicId":597,"templateId":36,"value":"N/A"},"599":{"id":1994,"characteristicId":599,"templateId":36,"value":"N/A"}}}},{"id":1736,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/sophos.jpg","logo":true,"scheme":false,"title":"Sophos Endpoint Protection","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"alias":"sophos-endpoint-protection","companyTypes":[],"description":"So Long Malware Remove detected malware automatically or isolate compromised devices in order to prevent damage. <span style=\"font-weight: bold;\">Isolate</span> Part of remediating a problem is putting it in quarantine so it can’t keep spreading. When necessary, we’ll even isolate compromised devices until we can be sure they’re safe. <span style=\"font-weight: bold;\">Threat Removal</span> If we find something malicious, we’ll go ahead and remove it for you. It’s the least we could do. We make it simple and automatic. <span style=\"font-weight: bold;\">Synchronized Security</span> By automating threat discovery, investigation, and response, Synchronized Security revolutionizes threat detection. Incident response times are reduced exponentially and tactical resources can be refocused on strategic analysis. <span style=\"font-weight: bold;\">Next-Gen Protection</span> We’re taking a new approach to protection. Sophos Endpoint blocks malware and infections by identifying and preventing the handful of techniques and behaviors used in almost every exploit. Sophos Endpoint doesn’t rely on signatures to catch malware, which means it catches zero-day threats without adversely affecting the performance of your device. So you get protection before those exploits even arrive. By correlating threat indicators, Sophos Endpoint can block web and application exploits, dangerous URLs, potentially unwanted apps, and malicious code from ever touching your endpoints. <span style=\"font-weight: bold;\">Decloaking Malware</span> Sophos Endpoint works on the device and in conjunction with the firewall to detect and isolate compromised devices. Synchronized Security gives you additional context providing information from the network. <span style=\"font-weight: bold;\">Behavioral Analytics</span> Determines suspicious behaviors, allowing for the detection of malware specifically designed to evade traditional solutions. <span style=\"font-weight: bold;\">Traffic Detection</span> Pre-filters all HTTP traffic and tracks suspicious traffic as well as the file path of the process sending malicious traffic. <span style=\"font-weight: bold;\">Integrated Endpoint and Network</span> Instant and automatic communication between the Endpoint and Network alerts the suspected system of exactly what the firewall is detecting, allowing the endpoint protection agent immediate use of that information to discover the process behind the threat. <span style=\"font-weight: bold;\">Complete Control</span> Enforce your web, application, device, and data policies with ease, thanks to seamless integration within the endpoint agent and the management console.\r\n<ul>\r\n<li>Web Control Category-based web filtering enforced both on and off the corporate network</li>\r\n<li>Application Control Point-and-click blocking of applications by category or by name</li>\r\n<li>Device Control Managed access to removable media and mobile devices</li>\r\n<li>Data Control Data-loss prevention (DLP) using prebuilt or custom rules</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Sophisticated Simplicity</span> Like your favorite smartphone or web application, Sophos Endpoint Protection delivers sophisticated functionality coupled with a simple, intuitive user experience.\r\n<ul>\r\n<li>Quick and easy deployment from the cloud or on-premises</li>\r\n<li>Default policies configured to balance protection, usability, and performance</li>\r\n<li>Automatic removal of third-party endpoint security products</li>\r\n<li>Point-and-click configuration of advanced features like HIPS and device control, made possible by continually updated data from SophosLabs</li>\r\n</ul>\r\n","shortDescription":"Sophos Endpoint Protection - Simple security for your business: Protect all your devices, One simplified management console, On-premises or in the cloud\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Sophos Endpoint Protection","keywords":"","description":"So Long Malware Remove detected malware automatically or isolate compromised devices in order to prevent damage. <span style=\"font-weight: bold;\">Isolate</span> Part of remediating a problem is putting it in quarantine so it can’t keep spreading. When ne","og:title":"Sophos Endpoint Protection","og:description":"So Long Malware Remove detected malware automatically or isolate compromised devices in order to prevent damage. <span style=\"font-weight: bold;\">Isolate</span> Part of remediating a problem is putting it in quarantine so it can’t keep spreading. When ne","og:image":"https://old.roi4cio.com/fileadmin/user_upload/sophos.jpg"},"eventUrl":"","translationId":1737,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"36":{"533":{"id":2029,"characteristicId":533,"templateId":36,"value":true},"535":{"id":2030,"characteristicId":535,"templateId":36,"value":true},"537":{"id":2031,"characteristicId":537,"templateId":36,"value":true},"539":{"id":2032,"characteristicId":539,"templateId":36,"value":true},"541":{"id":2033,"characteristicId":541,"templateId":36,"value":true},"543":{"id":2034,"characteristicId":543,"templateId":36,"value":"N/A"},"545":{"id":2035,"characteristicId":545,"templateId":36,"value":"N/A"},"547":{"id":2036,"characteristicId":547,"templateId":36,"value":"N/A"},"549":{"id":2037,"characteristicId":549,"templateId":36,"value":"N/A"},"551":{"id":2038,"characteristicId":551,"templateId":36,"value":"N/A"},"553":{"id":2039,"characteristicId":553,"templateId":36,"value":"N/A"},"555":{"id":2040,"characteristicId":555,"templateId":36,"value":"N/A"},"557":{"id":2041,"characteristicId":557,"templateId":36,"value":true},"559":{"id":2042,"characteristicId":559,"templateId":36,"value":true},"561":{"id":2043,"characteristicId":561,"templateId":36,"value":true},"563":{"id":2044,"characteristicId":563,"templateId":36,"value":true},"565":{"id":2045,"characteristicId":565,"templateId":36,"value":true},"567":{"id":2046,"characteristicId":567,"templateId":36,"value":"N/A"},"569":{"id":2047,"characteristicId":569,"templateId":36,"value":"N/A"},"571":{"id":2048,"characteristicId":571,"templateId":36,"value":"N/A"},"573":{"id":2049,"characteristicId":573,"templateId":36,"value":true},"575":{"id":2050,"characteristicId":575,"templateId":36,"value":true},"577":{"id":2051,"characteristicId":577,"templateId":36,"value":true},"579":{"id":2052,"characteristicId":579,"templateId":36,"value":"N/A"},"582":{"id":2053,"characteristicId":582,"templateId":36,"value":"YES"},"585":{"id":2054,"characteristicId":585,"templateId":36,"value":true},"587":{"id":2055,"characteristicId":587,"templateId":36,"value":true},"589":{"id":2056,"characteristicId":589,"templateId":36,"value":true},"591":{"id":2057,"characteristicId":591,"templateId":36,"value":"N/A"},"593":{"id":2058,"characteristicId":593,"templateId":36,"value":"N/A"},"595":{"id":2059,"characteristicId":595,"templateId":36,"value":"N/A"},"597":{"id":2061,"characteristicId":597,"templateId":36,"value":"N/A"},"599":{"id":2060,"characteristicId":599,"templateId":36,"value":"N/A"}}}},{"id":117,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Symantec_Endpoint_Protection.jpg","logo":true,"scheme":false,"title":"Symantec Endpoint Protection","vendorVerified":0,"rating":"2.70","implementationsCount":1,"suppliersCount":0,"alias":"symantec-endpoint-protection","companyTypes":[],"description":"Stop advanced threats with intelligent security\r\n \r\nLast year, we saw 317 million new malware variants, with targeted attacks and zero-day threats at an all-time high. Organizations are struggling to keep up with the rapidly evolving threats. Symantec Endpoint Protection is designed to protect against advanced threats with powerful, layered protection backed by industry leading security intelligence.\r\n \r\nNetwork Threat Protection stops most threats before they can take up residence on the machine\r\nInsight reputation scoring accurately detects rapidly mutating malware and zero-day threats\r\nSONAR™ behavioral analysis stops malicious files designed to appear legitimate\r\nStrong antivirus, antispyware and firewall protection eradicate known mass malware\r\n14 Years a Leader in Gartner Magic Quadrant for Endpoint Protection Platforms.","shortDescription":"Symantec Endpoint Protection - Proactively detect and block today’s most advanced threats with an endpoint protection solution that goes beyond antivirus.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Symantec Endpoint Protection","keywords":"threats, with, Protection, malware, Endpoint, Symantec, designed, protection","description":"Stop advanced threats with intelligent security\r\n \r\nLast year, we saw 317 million new malware variants, with targeted attacks and zero-day threats at an all-time high. Organizations are struggling to keep up with the rapidly evolving threats. Symantec End","og:title":"Symantec Endpoint Protection","og:description":"Stop advanced threats with intelligent security\r\n \r\nLast year, we saw 317 million new malware variants, with targeted attacks and zero-day threats at an all-time high. Organizations are struggling to keep up with the rapidly evolving threats. Symantec End","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Symantec_Endpoint_Protection.jpg"},"eventUrl":"","translationId":118,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"36":{"533":{"id":1930,"characteristicId":533,"templateId":36,"value":true},"535":{"id":1931,"characteristicId":535,"templateId":36,"value":true},"537":{"id":1932,"characteristicId":537,"templateId":36,"value":true},"539":{"id":1933,"characteristicId":539,"templateId":36,"value":true},"541":{"id":1934,"characteristicId":541,"templateId":36,"value":true},"543":{"id":1935,"characteristicId":543,"templateId":36,"value":"YES"},"545":{"id":1936,"characteristicId":545,"templateId":36,"value":"N/A"},"547":{"id":1937,"characteristicId":547,"templateId":36,"value":true},"549":{"id":1938,"characteristicId":549,"templateId":36,"value":"USB only"},"551":{"id":1939,"characteristicId":551,"templateId":36,"value":true},"553":{"id":1940,"characteristicId":553,"templateId":36,"value":"N/A"},"555":{"id":1941,"characteristicId":555,"templateId":36,"value":"USB only"},"557":{"id":1942,"characteristicId":557,"templateId":36,"value":"N/A"},"559":{"id":1943,"characteristicId":559,"templateId":36,"value":"N/A"},"561":{"id":1944,"characteristicId":561,"templateId":36,"value":true},"563":{"id":1945,"characteristicId":563,"templateId":36,"value":true},"565":{"id":1946,"characteristicId":565,"templateId":36,"value":"N/A"},"567":{"id":1947,"characteristicId":567,"templateId":36,"value":"N/A"},"569":{"id":1948,"characteristicId":569,"templateId":36,"value":"N/A"},"571":{"id":1949,"characteristicId":571,"templateId":36,"value":"N/A"},"573":{"id":1950,"characteristicId":573,"templateId":36,"value":true},"575":{"id":1951,"characteristicId":575,"templateId":36,"value":"N/A"},"577":{"id":1952,"characteristicId":577,"templateId":36,"value":"N/A"},"579":{"id":1953,"characteristicId":579,"templateId":36,"value":"N/A"},"582":{"id":1954,"characteristicId":582,"templateId":36,"value":"YES"},"585":{"id":1955,"characteristicId":585,"templateId":36,"value":true},"587":{"id":1956,"characteristicId":587,"templateId":36,"value":true},"589":{"id":1957,"characteristicId":589,"templateId":36,"value":true},"591":{"id":1958,"characteristicId":591,"templateId":36,"value":"N/A"},"593":{"id":1959,"characteristicId":593,"templateId":36,"value":"N/A"},"595":{"id":1960,"characteristicId":595,"templateId":36,"value":"N/A"},"597":{"id":1962,"characteristicId":597,"templateId":36,"value":"N/A"},"599":{"id":1961,"characteristicId":599,"templateId":36,"value":true}}}},{"id":1734,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Trend_Micro.png","logo":true,"scheme":false,"title":"Trend Micro Endpoint Security","vendorVerified":0,"rating":"1.40","implementationsCount":3,"suppliersCount":0,"alias":"trend-micro-endpoint-security","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Signature-based detection</span> Traditional signature-based anti-virus and anti-malware offer a high level of protection against known threats in a very computationally efficient way. (The process of matching files against a list of known malware signatures is far less CPU-intensive than the more advanced behavior-based detection techniques.) But with new variants of crypto-ransomware being released every minute, the usefulness of signature based detection as a standalone security technique is waning. To provide any real value to an enterprise, it must be complemented by a wide range of other techniques. Still, signature-based detection should be a part of a multi-layered security approach, including:\r\n<ul> <li>File and web reputation – Blocks the execution of any files, URLs and websites that match the signature of a known malicious item, but has difficulties with unknown/unrecognized threats (such as polymorphic or packed malware) or attacks originating from a ‘good’ ISP or data center.</li> <li>C&C blocking – Examines and shuts down endpoint traffic (over any port) that is attempting to connect to or contact a known command-and-control (C&C) server.</li> </ul>\r\n<span style=\"font-weight: bold;\">Non-signature-based detection</span> These techniques defend against malware without requiring any previous knowledge of exact file signatures. Instead, they make determinations based on a file’s characteristics and behavior. Some of the techniques to be included in a multi-layered security approach include the following: <span style=\"font-weight: bold;\">Variant protection</span> Variant protection looks for obfuscated, polymorphic or variants of malware by using fragments of previously seen malware and detection algorithms. <span style=\"font-weight: bold;\">Census check</span> The likelihood that a file is malicious can be determined in part by its prevalence and maturity (i.e., how often it has been seen over a given time period). Files that have never been detected are considered to be more suspicious. This technique has proven to be quite strong against malware hash factories. <span style=\"font-weight: bold;\">Whitelisting check</span> To reduce false positives on endpoint detections, all files should be checked against a database of known and verified good files. (As an example, Trend Micro’s certified safe software whitelist contains almost one billion known good files.) <span style=\"font-weight: bold;\">Behavioral analysis</span> This technique examines an item as it is unpacked, looking for suspicious or unusual behavior in how it interacts with operating systems, applications and scripts — even if the item isn’t on a blacklist. While crypto-ransomware can easily pass by traditional anti-virus (by being a freshly compiled executable), it will behave suspiciously as it loads into memory, triggering further action. As attackers are still finding it difficult to evade behavior-based detection, this technique is a must-have for any organization. Behavioral analysis can take many forms, including:\r\n<ul> <li>Script protection – Checks for malicious code or scripts within files attempting to execute on the endpoint (e.g., Office macros, scripts in PDF, PowerShell scripts).</li> <li>Injection protection – Blocks processes from injecting code where it shouldn’t be (such as program libraries).</li> <li>Suspicious action monitoring – Examines an item as it is loading or running, looking for suspicious behavior in how it interacts with other processes.</li> <li>Ransomware protection – Looks for rapid obfuscation/encryption of files by an unknown process, then terminates that process and restores the encrypted files.</li> <li>Memory inspection – Evaluates processes running in memory, scanning them for malware (or fragments of recognizable malware) as an item is unpacked into memory. This ensures malware packer tools can’t just obfuscate an older known piece of malware.</li> <li>Browser exploit protection – Uses emulation and algorithmic detection technology to protect against exploit code on web pages (e.g., exploits in Java and Flash).</li> </ul>\r\n<span style=\"font-weight: bold;\">Exploit prevention</span> While there are hundreds of thousands of malicious files out there, there aren’t very many unique exploits that can be used to compromise a user’s system. As such, it is often easier to focus on preventing the exploitation of specific application or OS-related vulnerabilities rather than blocking the files themselves. Also known as vulnerability shielding, exploit prevention techniques can include:\r\n<ul> <li>Host-based firewalls – Protects endpoints on the network using stateful inspection and network virus scanning.</li> <li>Exploit protection – Monitors programs that demonstrate abnormal behavior associated with exploit attacks, and uses multiple heuristic analysis techniques to detect exploit code on web pages as users attempt to access them with their browsers.</li> <li>Intrusion prevention – Blocks network-based exploits of known vulnerabilities in popular applications and operating systems by using host-based intrusion prevention (HIPS) rules that provide a virtual patch.</li> </ul>\r\n","shortDescription":"Trend Micro Endpoint Security - Defend against the threats of today and tomorrow with XGen™ security","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Trend Micro Endpoint Security","keywords":"","description":"<span style=\"font-weight: bold;\">Signature-based detection</span> Traditional signature-based anti-virus and anti-malware offer a high level of protection against known threats in a very computationally efficient way. (The process of matching files against a l","og:title":"Trend Micro Endpoint Security","og:description":"<span style=\"font-weight: bold;\">Signature-based detection</span> Traditional signature-based anti-virus and anti-malware offer a high level of protection against known threats in a very computationally efficient way. (The process of matching files against a l","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Trend_Micro.png"},"eventUrl":"","translationId":1735,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"36":{"533":{"id":1996,"characteristicId":533,"templateId":36,"value":true},"535":{"id":1997,"characteristicId":535,"templateId":36,"value":true},"537":{"id":1998,"characteristicId":537,"templateId":36,"value":true},"539":{"id":1999,"characteristicId":539,"templateId":36,"value":true},"541":{"id":2000,"characteristicId":541,"templateId":36,"value":true},"543":{"id":2001,"characteristicId":543,"templateId":36,"value":"Yes, if there is the McAfee Threat Intelligence Exchange module"},"545":{"id":2002,"characteristicId":545,"templateId":36,"value":"N/A"},"547":{"id":2003,"characteristicId":547,"templateId":36,"value":true},"549":{"id":2004,"characteristicId":549,"templateId":36,"value":"YES"},"551":{"id":2005,"characteristicId":551,"templateId":36,"value":true},"553":{"id":2006,"characteristicId":553,"templateId":36,"value":"YES"},"555":{"id":2007,"characteristicId":555,"templateId":36,"value":"YES"},"557":{"id":2008,"characteristicId":557,"templateId":36,"value":"N/A"},"559":{"id":2009,"characteristicId":559,"templateId":36,"value":"N/A"},"561":{"id":2010,"characteristicId":561,"templateId":36,"value":true},"563":{"id":2011,"characteristicId":563,"templateId":36,"value":true},"565":{"id":2012,"characteristicId":565,"templateId":36,"value":"N/A"},"567":{"id":2013,"characteristicId":567,"templateId":36,"value":"N/A"},"569":{"id":2014,"characteristicId":569,"templateId":36,"value":"N/A"},"571":{"id":2015,"characteristicId":571,"templateId":36,"value":"N/A"},"573":{"id":2016,"characteristicId":573,"templateId":36,"value":true},"575":{"id":2017,"characteristicId":575,"templateId":36,"value":"N/A"},"577":{"id":2018,"characteristicId":577,"templateId":36,"value":"N/A"},"579":{"id":2019,"characteristicId":579,"templateId":36,"value":"N/A"},"582":{"id":2020,"characteristicId":582,"templateId":36,"value":"Yes, if there is VDI-Module"},"585":{"id":2021,"characteristicId":585,"templateId":36,"value":"N/A"},"587":{"id":2022,"characteristicId":587,"templateId":36,"value":"N/A"},"589":{"id":2023,"characteristicId":589,"templateId":36,"value":true},"591":{"id":2024,"characteristicId":591,"templateId":36,"value":"N/A"},"593":{"id":2025,"characteristicId":593,"templateId":36,"value":"Yes, if there is McAfee Threat Intelligence Exchange module"},"595":{"id":2026,"characteristicId":595,"templateId":36,"value":"Yes, if there is McAfee Threat Intelligence Exchange module"},"597":{"id":2028,"characteristicId":597,"templateId":36,"value":"N/A"},"599":{"id":2027,"characteristicId":599,"templateId":36,"value":true}}}}],"selectedTemplateId":36},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}