Skip to main content
All CollectionsEndpoint Protection
Understanding the modules included in Endpoint Protection
Understanding the modules included in Endpoint Protection

This guide provides details on the multiple elements of our Endpoint Protection software that work together to keep your devices secure.

Matthew Elliott avatar
Written by Matthew Elliott
Updated over a year ago

Anti-Malware

Our Malware scanner module uses two methods of Malware detection:

  1. A traditional scanning method is employed where scanned content is matched against a signature database. This scanning method is effective against confirmed threats that have been researched and documented. However, no matter how promptly the signature database is updated, there is always a vulnerability window between the time when a new threat is discovered and when a fix is released.

  2. Against brand-new, undocumented threats, a second layer of protection is provided by our heuristic engine. Heuristic algorithms detect malware based on behavioural characteristics. This module runs suspicious files in a virtual environment to test their impact on the system and ensure they pose no threat.


Advanced Threat Control

Next, we have the Advanced Threat Control module. This module continuously monitors running processes and grades suspicious behaviours. Each suspicious behaviour raises the process rating, and when a threshold is reached, an alarm is triggered. This proactive approach allows you to stay one step ahead of potential threats, giving you peace of mind knowing that your system is constantly being monitored.


Firewall

Now, let's talk about the Firewall module. This module controls applications' access to the network and the internet. It automatically allows access for known, legitimate applications, thanks to its comprehensive database. Additionally, the firewall protects your system against port scans, which hackers use to identify which services are running on your computer.


Content Control

Moving on to the Content Control module. This powerful feature allows administrators to have full control over the type of web content that can be viewed on users' endpoints. You can also restrict internet access during certain times of the day and manage which local applications can be run on users' endpoints. With Content Control, you have the power to create a safe and productive digital environment for your team.


For more information on the Content Control module, please Contact Us.


Device Control

The Device Control module allows you to block various types of devices from connecting to your endpoints, preventing sensitive data leakage and malware infections. You can define and apply blocking rules and exceptions to a wide range of device types, including USB flash drives, Bluetooth devices, and storage devices. With Device Control, you have complete control over the devices that can access your system.


Advanced Anti-Exploit

This module provides on-execution protection against exploit attempts targeting known and unknown vulnerabilities in commonly used applications. Whether it's web browsers, Microsoft Office, or Adobe Reader, the Advanced Anti-Exploit module ensures that your system remains secure against potential threats.


Network Attack Defense

The Network Attack Defense module detects network attacks designed to gain access to your devices through specific techniques such as brute-force attacks, network exploits, password stealers, drive-by-download infection vectors, bots, and Trojans. With Network Attack Defense, you can rest easy knowing that your system is protected against various attack vectors.


Patch Management

This module helps you keep your operating systems and software applications up-to-date, providing you with a comprehensive view of the patch status across your Windows and Linux install base. With Patch Management, you can quickly scan for missing patches and install them with automatic or manual deployment options. You can also create a patch inventory, schedule patch scanning, and postpone reboots to increase your patch compliance and minimize security risks.
โ€‹

Did this answer your question?