rivsy Lv5Posted 24 Jan 2024 09:19
  
Sangfor Endpoint Secure features:
1. Lightweight Sangfor Engine Zero
File detection rates reach 99.7% based on high-dimensional signatures, and the detection rate of multi-class classification reaches 90.3%.

2. Threat Tracking
Once a threat is found on one endpoint, identical virus files will search on all endpoints across the network and removed, protecting every endpoint within the network.

3. Correlation across Endpoint and Network
Upon discovering threats on endpoints, the network device will automatically coordinate with Sangfor Endpoint Secure to handle the endpoint.

4. Ransomware Hunting with Bait
By placing bait files in key directories and random system directories, emergency response is initiated while the bait files are being encrypted, halting the encryption process, and locating and removing virus source files.

5. Visualization and Discovery for Endpoint Security
Efficient multidimensional management on network-wide endpoints is carried out through the Sangfor Endpoint Secure manager, making risks to each endpoint visible, assets controllable, and asset owners traceable.

6. Self-developed Behavior Monitoring Sandbox
Based on user mode and kernel mode behavior monitoring technology and abnormal behavior identification engine, ZSand sandbox developed by Sangfor can provide dynamic file detection, IoC extraction and malicious behavior recording capabilities.

7. Multidimensional Funnel-Shaped Detection Framework
By using the multidimensional funnel-shaped detection framework, the detection efficiency is effectively improved and the consumption of endpoint resources is reduced. All files are subject to effective virus searching and killing via Sangfor Antivirus Engine, Sangfor Neural-X security engine and other multidimensional engines .

8. Closed-loop Endpoint Security
In accordance with Gartner's four-stage model, 12 key functions are defined at prevention, organization, detection and response stages, to effectively protect endpoints. Sangfor Endpoint Secure puts forward a fully-dimensional endpoint security solution.

9. Micro-segmentation and Lower Threat Impacts
The micro-segmentation function provides access control configuration based on different types such as IP group, business system, and tags to achieve granular control, increasing efficiency in security management.

10. Endpoint Security & Integrity Check
The endpoint security & integrity check is designed according to the host security requirements. Identity authentication, access control, security audit, intrusion prevention, malicious code prevention, and other policies are carried out to meet the host security requirements and allow an enterprise to build a multi-class protection system.

11. Security Perimeter with Decoupled Underlying Virtualization Platform
Innovative micro-segmentation is to prevent lateral movement and virus spreading in LAN. A system solution is provided based on traffic access control between application roles in the security domain, providing comprehensive access control between host application roles, and efficient visibility of the security access policy configuration. The access control policy of servers is managed in a centralized and unified way, and it is not affected by virtualization platforms, physical machines, or virtual machines, based on the access control of the Agent software installed on the lightweight host.



I Can Help:

Change

Moderator on This Board

18
8
0

Started Topics

Followers

Follow

3
0
2

Started Topics

Followers

Follow

Trending Topics

Board Leaders