Built on one of the most effective and efficient Anti-Virus Engines, our Endpoint Security add-on is the perfect solution to ensuring that your machines are safe from all types of dangerous network programs. Best of all it can easily be added to your monthly Automation service agreement, so there is no large up front cost, no extra hardware to purchase, and no additional software to keep track of. We manage everything from end-to-end.
PROTECTION FROM VIRUSES, WORMS, AND TROJANS
Analyze and detect unwanted executable applications or DLL libraries within the system that may be spyware, adware etc. Based upon the security profile, Endpoint Security will remove these programs or block access to them.
Scan the system registry for suspicious entries, temporary Internet files and tracking cookies, and treat the potentially harmful items in the same manner as any other infection.
Detects computer viruses by:
Scanning – on-access and on-demand scanning
Heuristic Analysis – dynamic emulation of a scanned object’s instructions within a virtual computing environment
Generic Detection – detection of instructions characteristic of the virus or group of viruses
Known Virus Detection – searching for character strings characteristic of a virus
MULTI-LEVEL VIRUS CHECKS
Checks incoming and outgoing mail by using plug-ins designed for the most frequently used e-mail programs. The E-mail Scanner is an additional program for electronic mail monitoring and is designed for applications supporting the POP3/SMTP protocols. Once detected, viruses are cleaned or quarantined. Some e-mail clients may support messages with text certifying that sent and received e-mail has been scanned for viruses. In addition, for an increased level of security when working with electronic mail, the Attachment Filter can be set by defining undesirable or suspect files.
Scans files as they are copied, opened or saved. When the Real Time Protection discovers a virus in a file that is accessed, it stops the operation currently being performed and does not allow the virus to activate itself. The Real Time Protection, loaded in the memory of the computer during system start up, also provides vital protection for the system areas of the computer.
Scanning is a crucial part of Endpoint Security functionality. Scans can be run on-demand or scheduled to run periodically at convenient times. Endpoint Security comes with pre-defined security profiles along with the ability to create customer profiles.
Spyware is usually defined as a type of malware (software that gathers information from a computer without the user's knowledge or consent). Some spyware applications may also be deliberately installed and often contain advertisements, window pop-ups or different types of unpleasant software. Ideally, spyware and other malware should be prevented from intruding. Currently, the most common source of infection is websites with potentially dangerous content. Other methods of transmission include e-mail or transmission by worms and viruses. The most important protection is to use an always-on background scanner, such as the cutting edge Endpoint Security Spyware component. It works like a resident shield and scans applications in the background as they run.
Centrally managed security profiles are defined and deployed to the managed computers using the ITonDemand Automation console interface. The profiles are used to establish best practices to keep the managed computers running and malware free. All information detected is logged within the system and available for executive summary and detailed management reporting.
As a fully integrated component of the ITonDemand Automation Framework, Endpoint Security is configured, deployed and managed from the same ITonDemand Automation interface that administrators already use to manage their computing environments, making implementation seamless and easy. Once deployed, the system is monitored to ensure protection is active and enabled. Utilizing the ITonDemand Automation proactive practice, updates are handled automatically on a scheduled basis without the need for user interaction. Security protection is then always up and running and kept up-to date. All activity and information detected is logged and stored in the ITonDemand Automation database and is available for executive summary and detailed management reporting.
The Scanning engine has received numerous awards for its excellent detection of “in the wild” viruses, including the VB100% award. Its unique combination of detection methods provides full protection against viruses, worms and trojans.
Cutting-Edge Anti-Spyware Technology
Detects spyware, adware, DLL-trojans, keyloggers, and much more. Malware hidden in data streams, archives, or the Windows registry is also detected.
FULL ON-ACCESS PROTECTION
Provides maximum protection by scanning every file opened, executed, or saved. It also prevents the opening or executing of infected files.
FLEXIBLE INTELLIGENT SCANNING
Is used to include/exclude files from being scanned based on individual file extensions and can handle exceptions for potentially unwanted programs such as adware.
FULL E-MAIL PROTECTION
Checks every e-mail sent or received, providing full protection from e-mail-borne threats. Supports MS Outlook.
AUTOMATIC THREAT HANDLING
Automatically heals or removes infected files and other threats such as trojans, worms and spyware.
Automatically provides recommended daily schedules for scanning and updating, and allows you to create custom-scheduled events.
ZERO EXPENSIVE SOFTWARE OR HARDWARE TO PURCHASE
Most enterprise level Antivirus programs require dedicated hardware resources, expensive software and implementation startup costs, and can still be difficult to maintain and keep up to date. Every time a new version of the software comes out with improved protection or functionality, you have to go through the whole process of making a decision, determining if it is in your budget, or going through the hassle of constantly renewing your support contract. Our solution is easy, cost-effective and does not require special licenses, server hardware or additional time spent implementing, installing and configuring. Best of all, it comes integrated with our management services and therefore allows you to know your costs up front and spread them out over time.
Request a quote today and get started protection your vital systems from harmful spyware and viruses. We look forward to becoming your complete IT Support Vendor.