Antivirus – scans and eradicates malware that arrives on a system.
Firewall and Intrusion Prevention – blocks malware before it spreads to the machine and controls traffic.
Application and Device Control – controls file, registry, and device access and behavior with whitelisting and blacklisting.
Power Eraser – which can be triggered remotely, to address advanced persistent threats and remedy tenacious malware.
Host Integrity – ensures endpoints are protected and compliant by enforcing policies.
System Lockdown – allows whitelisted applications to run, or block blacklisted applications from running.
Advanced Machine Language (AML) – detects new and evolving threats before they run.
Memory Exploit Mitigation – blocks zero-day exploits against vulnerabilities in popular software.
Behavior Monitoring – monitors and blocks file that exhibit suspicious behaviors.
Global Intelligence Network (GIN) – the world’s largest civilian threat intelligence network.
Reputation Analysis – determines safety of files and websites using artificial intelligence techniques in the cloud.
Emulator – Uses a lightweight sandbox to detect polymorphic malware hidden by custom packers.
Intelligent Threat Cloud’s rapid scan capabilities using advanced techniques such as pipelining and trust propagation.