Harmony Endpoint

Vsa zaščita, ki jo potrebujete za svojo napravo

V današnjem času je zaščita vaše naprave kritičnega pomena, naj bo pri delu od doma ali v pisarni.

Harmony Endpoint nudi celovito zaščito naprave na najvišjem možnem varnostnem nivoju, preprečuje vdore in ščiti vaše podatke.

Celovita zaščita naprave

Harmony Endpoint je rešitev, ki ščiti organizacije in zaposlene, tako v pisarni kot pri delu od doma, pred vse bolj prefinjenimi spletnimi prevarami.

01.

CELOVITA ZAŠČITA SISTEMOV

Preprečuje najbolj pereče nevarnosti za končne uporabnike.

02.

HITRA OBNOVITEV

Avtomatizira 90% opravil pri odkrivanju nevarnosti, njeni raziskavi in odpravi težav.

03.

NAJUGODNEJŠI SKUPNI STROŠKI LASTNIŠTVA

Enotna, učinkovita in stroškovno učinkovita rešitev, ki je popolnoma prilagodljiva vašim varnostnim in skladnostnim zahtevam.

FUNKCIJE

Anti-Ransomware

Harmony Endpoint prepozna vzorce ransomware kot je enkripcija vaših datotek ali varnostnih kopij in avtomatično ter varno povrne zakriptirane datoteke.

Zero-Phishing®

Tehnologija, ki prepozna in blokira uporabo phishing strani v realnem času. Sproti preverja spletne strani in vam v primeru nevarnosti blokira vnos podatkov v spletne obrazce.

Malware in zaščita datotek

Blokira malware, ki izvira iz spletna ali e-poštnih priponk, še preden te dosežejo uporabnika.

Prepreči krajo podatkov

Preprečuje vnos službenih gesel v aplikacije, ki jih ne potrebujejo.

Posnemanje in izločitev nevarnosti

Vsaka datoteka, ki jo prejmete prek e-pošte ali prenesete iz interneta je poslana v preizkus pred škodljivimi programi. V primeru odkritja nevarnosti, datoteko očisti in vam jo dostavi brez škodljive vsebine.

Oglejte si video s predstavitvijo:

PAKETI

Vse cene brez DDV.

Basic
22 leto / uporabnik
Reduce Attack Surface
Host Firewall
Application Control
Compliance
NGAV: Prevent Attacks Before They Run
Anti-Malware
ML based NGAV
NGAV: Runtime Detection and Protection
Anti-Ransomware
Behavioral Guard
Anti-Bot
Anti-Exploit
Web Protection
Zero-day Phishing site protection
Corporate Password Reuse Protection
URL Filtering
Malicious site protection
Attack Investigation and Response
Forensics collection and detection
Forensics report – incident visibility, MITRE mapping
Automated attack chain full sterilization
Ransomware encrypted files restoration
Threat Hunting
VPN Access
Remote Access VPN
Threat Intelligence
Powered by ThreatCloud™
Automated IoC and IoA cloud sharing
Centralized Management
Cloud Management
On-Prem Management *
Support
Standard Pro Support (5*9)
Incident Response Service
Advanced
35 leto / uporabnik
Reduce Attack Surface
Host Firewall
Application Control
Compliance
NGAV: Prevent Attacks Before They Run
Anti-Malware
ML based NGAV
NGAV: Runtime Detection and Protection
Anti-Ransomware
Behavioral Guard
Anti-Bot
Anti-Exploit
Web Protection
Zero-day Phishing site protection
Corporate Password Reuse Protection
URL Filtering
Malicious site protection
Attack Investigation and Response
Forensics collection and detection
Forensics report – incident visibility, MITRE mapping
Automated attack chain full sterilization
Ransomware encrypted files restoration
Threat Hunting
VPN Access
Remote Access VPN
Threat Intelligence
Powered by ThreatCloud™
Automated IoC and IoA cloud sharing
Centralized Management
Cloud Management
On-Prem Management *
Support
Standard Pro Support (5*9)
Content Disarm & Reconstruction (CDR) across email and web
Threat Emulation (sandBox)
Threat Extraction (Sanitizes files in 1.5 seconds)
Mobile Protection
iOS Protection
Android Protection
Incident Response Service
Complete
55 leto / uporabnik
Reduce Attack Surface
Host Firewall
Application Control
Compliance
NGAV: Prevent Attacks Before They Run
Anti-Malware
ML based NGAV
NGAV: Runtime Detection and Protection
Anti-Ransomware
Behavioral Guard
Anti-Bot
Anti-Exploit
Web Protection
Zero-day Phishing site protection
Corporate Password Reuse Protection
URL Filtering
Malicious site protection
Attack Investigation and Response
Forensics collection and detection
Forensics report – incident visibility, MITRE mapping
Automated attack chain full sterilization
Ransomware encrypted files restoration
Threat Hunting
VPN Access
Remote Access VPN
Threat Intelligence
Powered by ThreatCloud™
Automated IoC and IoA cloud sharing
Centralized Management
Cloud Management
On-Prem Management *
Support
Standard Pro Support (5*9)
Content Disarm & Reconstruction (CDR) across email and web
Threat Emulation (sandBox)
Threat Extraction (Sanitizes files in 1.5 seconds)
Data Protection **
Host Encryption
Media encryption and port protection
Mobile Protection
iOS Protection
Android Protection
Incident Response Service

KONTAKTIRAJTE NAS ZA PONUDBO IN BREZPLAČEN 30-DNEVNI PREIZKUS

    * Harmony Endpoint on-premises Server is at additional cost

     

    ** Port protection is available also in Basic and Advanced