SERVER SECURITY SOFTWARE
Integrated multi-layered endpoint protection in a single, lightweight client that replaces multiple security agents, protecting against Advanced Persistent Threats (APTs), known exploits, zero-days, and all other attack vectors.
Integrated Firewall, IPS, Anti-Malware, Anti-Virus and Vulnerability Assessment
Targeted attacks can easily bypass anti-virus solutions and other individual lines of defense, necessitating multi-layered endpoint protection. The PowerBroker Endpoint Protection Platform eliminates the need to implement and manage multiple point products by combining system and application firewalls, intrusion prevention, anti-malware, anti-virus, and local vulnerability assessment capabilities. PowerBroker Endpoint Protection secures systems from entire classes of attack, without constant rule or signature updates.Protect critical endpoints with an all-in-one firewall, IPS, anti-malware, anti-virus solution Conduct local vulnerability assessments of air-gapped and otherwise disconnected systems Protect web servers and web applications against exploits, zero-days, and unauthorized access (optional) Reduce system management costs with a “no-touch” solution that eliminates the need for constant updates Rely on updates from the renowned BeyondTrust Security Research Team
Comprehensive APT Protection
Defend desktops and web servers (optional) against viruses, spyware, worms, Trojans, and other malicious exploits including zero-days.
Protection for Desktops, Network Servers and Web Servers
The PowerBroker Endpoint Protection Suite is available in three versions that are configured and tuned for specific system types.
Reduced Endpoint Protection Costs
Eliminate the licensing and support costs associated with buying and maintaining multiple endpoint security products. Lower system requirements by over 50% compared to the memory footprint of maintaining 5+ discrete endpoint security products.
Centralized Management and Analytics
Leverage with the optional BeyondInsight IT Risk Management Platform for centralized management, agent deployment, real-time alerting, compliance reporting, and behavioral analysis.
APT AND SYSTEM PROTECTION
Application Control: Authorize or deny program file execution based on custom policies.
Registry Protection: Stop malicious programs or errant users from infecting or modifying systems.
Storage Protection: Prevent data leakage by regulating USB and FireWire storage devices.
FILE INTEGRITY MONITORING
Visibility: Specify files and directories to monitor.
Control: Authorize changes by caller and attributes.
Protection: Tamper-proof systems and applications.
INTRUSION PREVENTION / ZERO-DAY PROTECTION
Zero-Day Protection: Provides protection for systems containing vulnerabilities with no available patches.
Event Analysis: Forward attack events to the BeyondInsight console (optional) for centralized reporting, alerting and management.
Traffic Control: Performs traditional firewall duties, allowing or denying traffic based on a set of predetermined rules.
Real-Time Source Monitoring: Only allows traffic from authorized applications, preventing unauthorized programs from making illegal outbound connections.
LOCAL VULNERABILITY SCANNING
Offline Coverage: Perform local vulnerability scanning when local credentials and more frequent scans are required.
Exposure Identification: Find missing patches, unsecured configurations, and zero-day vulnerabilities.
VIRUS AND SPYWARE PROTECTION
Infection Prevention: Provides complete signature and heuristics-based attack protection.
Event Analysis: Forward malware events to the BeyondInsight console (optional) for centralized reporting, alerting and management.
WEB SERVER PROTECTION (OPTIONAL)
Attack Protection: Thwart buffer overflows, parser evasions, directory traversals, and many other attack types.
Pattern Detection: Block requests resembling attack patterns such as SQL injection, cross-site scripting, and more.
Zero-Day Protection: Eliminate the need for a database of attack signatures that requires regular updating.
Damage Prevention: Detect attacks and prevent unauthorized access and/or damage to the web server and host applications.
Application Support: Support and protect all common web-based applications, plus many third-party and custom applications.