Description
SEP Extends to all OSs and all devices including mobile. Offers cloud management.
Adaptive Protection automates security configuration to specifically deliver customized protection for each organization effortlessly. Proactive attack surface reduction and innovative attack prevention technologies provide the strongest defense against the hardest-to-detect threats that rely on stealthy malware, credential theft, fileless, and “living off the land” attack methods.
Breach Assessment continuously probes Active Directory for domain misconfigurations, vulnerabilities, and persistence using attack
simulations to identify risks and allow for immediate mitigation and remediation recommendations.
Device Control- specifies block or allow policies on different types of devices that attach to client computers, such as USB, infrared, and FireWire devices to reduce the risk of threats and exfiltration.
Application Control- assesses the risk of applications and their vulnerabilities and allows only known good applications to run.
Exploit Prevention blocks memory-based zero-day exploits of vulnerabilities in popular software.
Intensive Protection separately enables fine-grained tuning of the level of detection and blocking to optimize protection and gain enhanced visibility into suspicious files.
Network Connection Security identifies rogue Wi-Fi networks, utilizes hotspot reputation technology, and delivers a policy-driven VPN to protect network connections and support compliance.
Antivirus – scans and eradicates malware that arrives on a system.