Reduce Attack Surface
- Host Firewall
- Application Control
- Compliance
|
✓ |
✓ |
✓ |
NGAV: Prevent Attacks Before They Run
- Anti-Malware
- ML based NGAV
|
✓ |
✓ |
✓ |
NGAV: Runtime Detection and Protection
- Anti-Ransomware
- Behavioral Guard
- Anti-Bot
- Anti-Exploit
|
✓ |
✓ |
✓ |
Web Protection
- Zero-day Phishing site protection
- Corporate Password Reuse Protection
- URL Filtering
- Malicious site protection
|
✓ |
✓ |
✓ |
Attack Investigation and Response
- Forensics collection and detection
- Forensics report – incident visibility, MITRE mapping
- Automated attack chain full sterilization
- Ransomware encrypted files restoration
- Threat Hunting
|
✓ |
✓ |
✓ |
VPN Access
|
✓ |
✓ |
✓ |
Threat Intelligence
- Powered by ThreatCloud™
- Automated IoC and IoA cloud sharing
|
✓ |
✓ |
✓ |
Centralized Management
- Cloud Management
- On-Prem Management *
|
✓ |
✓ |
✓ |
Support
- Standard Pro Support (5*9)
|
✓ |
✓ |
✓ |
Content Disarm & Reconstruction (CDR) across email and web
- Threat Emulation (sandBox)
- Threat Extraction (Sanitizes files in 1.5 seconds)
|
|
✓ |
✓ |
Data Protection
- Host Encryption
- Media encryption and port protection
|
|
|
✓ ** |
Mobile Protection
- iOS Protection
- Android Protection
|
|
+ |
+ |
Incident Response Service |
+ |
+ |
+ |