SOLUTIONS TO PROTECT ENDPOINT ENDPOINT ENDPOINT ENDPOINT SECURITY – SES


Next Generation Endpoint Protection (NGEPP) Stormshield Endpoint Security (SES) is a modular security product from Airbus Defense and Space designed with an administration interface and Simple controls. Products are used in many companies and organizations around the world. SES is one of the pioneers and leaders in the field of Memory Intrusion Protection (MIPS), allowing to identify and prevent unknown attacks. As a result, SES MIPS is at the forefront of its ability to identify and prevent all types of malware, invisible (fileless) malware, and zero-day vulnerabilities.

Requirement for solution & nbsp; endpoint protection & nbsp; next generation (Next Generation) . < / strong>

Organizations around the world are confused and discouraged by the ineffectiveness of traditional terminal security products in preventing sophisticated criminal attacks. In the face of that challenge, a new generation of endpoint protection has been created to provide effective security. To meet those requirements, NGEPPs must consume less system resources, be compatible with existing security ecosystems and operate on many different platforms with real-time connectivity.

Core features required for next generation terminal protection software (NGEPP):

  • Advanced detection
  • Risk mitigation
  • Prevent malicious processes
  • Data protection
  • Prevention
  • Treatment
  • Threat Intelligence

SES with a modular architecture, uses few allowed system resources;

  • Protects terminals against sophisticated attacks, network connections from misuse and data from loss and theft
  • Main auto-execution book to ensure that the protection and control of the terminal is in place at the right time, according to the risk classification of the device
  • Centralized management of all terminals (machine servers, desktops, laptops …)

Protection against zero-day threats

  • Memory Intrusion Prevention System (MIPS) protects against all “next generation of malicious code” including unknown and invisible types
  • proactive intrusion prevention system (HIPS) and server-based firewall protect the system from network activities
  • System integrated security functions such as anti-virus, anti-spyware Application whitelisting and messages provide the traditional protection needed to respond to internal compliance and audit requirements

Monitor, test, and control network applications and devices:

  • Apply a VPN, wired, and wireless network access policy depending on how the device is accessed – on the corporate network, from outside the corporate network or from public access points < / li>
  • Protect wireless connections and enforce policy restricting connections to specific wireless access points
  • Allows monitoring, control, testing and enforcement policies are flexible to ensure that productivity is high but data remains under control at all times
  • Allows a list of allowed and automatically stopped applications Applications are not on the safe list

Integrates with data encryption software package to protect information in collaborative environments.

  • Encrypt the entire hard drive to ensure the data stored in the hard drive is always secure even in the event of loss or theft
  • Encrypt by file and / or folders to prevent internal illegal access
  • Encrypt your external storage device (USB, …) to help ensure data is always protected, even when copied over USB or other removable storage devices
  • Integrates with Stormshield Data Security software to enable data protection in collaborative environments

Leave a Reply

Your email address will not be published.