SES Complete Extends to all OSs and all devices including mobile. Offers cloud management
Adaptive Protection automates security configuration to specifically deliver customized protection for each organization effortlessly. Proactive attack surface reduction and innovative attack prevention technologies provide the strongest defense against the hardest-to-detect threats that rely on stealthy malware, credential theft, fileless, and “living off the land” attack methods.
SES Complete Benefits Industry-leading solution that addresses threats across the entire attack chain.
Highest ROI with easy deployment and management as a single-agent solution combining many innovative security layers all in one.
Latest security features and technology innovations are available at no extra cost.
Protection for corporate and remote employees by supporting all devices and Operating Systems with on-prem, cloud, or hybrid management.
Breach Assessment continuously probes Active Directory for domain misconfigurations, vulnerabilities, and persistence using attack
simulations to identify risks and allow for immediate mitigation and remediation recommendations.
Device Control- specifies block or allow policies on different types of devices that attach to client computers, such as USB, infrared, and FireWire devices to reduce the risk of threats and exfiltration.
Application Control- assesses the risk of applications and their vulnerabilities and allows only known good applications to run.
Exploit Prevention blocks memory-based zero-day exploits of vulnerabilities in popular software.
Intensive Protection separately enables fine-grained tuning of the level of detection and blocking to optimize protection and gain enhanced visibility into suspicious files.
Network Connection Security identifies rogue Wi-Fi networks, utilizes hotspot reputation technology, and delivers a policy-driven VPN to protect network connections and support compliance.
Antivirus – scans and eradicates malware that arrives on a system.
Firewall and Intrusion Prevention – blocks malware before it spreads to the machine and controls traffic.
Application and Device Control – controls file, registry, and device access and behavior with whitelisting and blacklisting.
Power Eraser – which can be triggered remotely, to address advanced persistent threats and remedy tenacious malware.
Host Integrity – ensures endpoints are protected and compliant by enforcing policies.
System Lockdown – allows whitelisted applications to run, or block blacklisted applications from running.
Advanced Machine Language (AML) – detects new and evolving threats before they run.
Memory Exploit Mitigation – blocks zero-day exploits against vulnerabilities in popular software.
Behavior Monitoring – monitors and blocks file that exhibit suspicious behaviors.
Global Intelligence Network (GIN) – the world’s largest civilian threat intelligence network.
Reputation Analysis – determines safety of files and websites using artificial intelligence techniques in the cloud.
Emulator – Uses a lightweight sandbox to detect polymorphic malware hidden by custom packers.
Intelligent Threat Cloud’s rapid scan capabilities using advanced techniques such as pipelining and trust propagation.