Asset ManagementKeeps records of each network asset and its activity. Discovers new assets accessing the network. | 85% (Based on 5 reviews) |
System IsolationCuts off network connection or temporarily inactivate applications until incidents are remedied. | 85% (Based on 5 reviews) |
Device ControlManages user network accessibility on laptops and mobile devices. | 91% (Based on 5 reviews) |
Web ControlFilters websites and manages whitelisting to enforce compliance protocols for users accessing the internet within the network. | 94% (Based on 5 reviews) |
Application ControlBlocks endpoint users from accessing restricted applications. | 94% (Based on 5 reviews) |
Endpoint IntelligenceAnalysis for users to examine threat intelligence data specific to their endpoint devices. | 88% (Based on 5 reviews) |
FirewallProtects endpoint devices from a variety of attacks and malware threats. | 97% (Based on 5 reviews) |
Malware DetectionProvides multiple techniques and information sources to alert users of malware occurrences. | 85% (Based on 5 reviews) |
Incident ReportsProduces reports detailing trends and vulnerabilities related to their network and infrastructure. | 100% (Based on 5 reviews) |
Security ValidationThe product has a recurring examination process to update your intelligence reports as new threats emerge. | 100% (Based on 5 reviews) |
ComplianceMonitors assets and enforces security policies to audit assets and infrastructure security. | 100% (Based on 5 reviews) |