SBN

Sophos: Endpoint Protection [product overview]

Introduction

Sophos Endpoint Protection is an easy-to-use, simple application for your endpoint devices, whether they run Windows, Linux or Mac OS. It is able to protect a wide variety of systems against malware and threats to your network and computer systems.

Sophos has created an endpoint security system that integrates technologies such as malicious traffic detection and real-time threat intelligence, which allows this endpoint protection system to keep your organizational systems safe from malicious threats. We will be taking a quick look at some of these features, as well as a general overview of how the system works and how it integrates with InfoSec Institute’s SecurityIQ system.

Sophos Endpoint Protection is more than just a signature-based malware scanner. The Sophos system is able to identify suspicious behavior and correlate it with their real-time threat detection system from SophosLabs.

These events can be triggered by malicious website addresses or malicious payloads in Web code — anything that produces sudden changes to system activity and command-and-control traffic over the Internet. This greatly reduces the chances of your computer systems being infected by malware, and greatly enhances your ability to view your current environment.

Let’s take a look at some of the key features that Sophos Endpoint Protection offers users.

  • So Long Malware: Isolate, threat removal and synchronized security
  • Next-Gen Protection: Threat indicator correlation
  • Decloaking Malware: System and firewall-based protection
  • Behavioral Analytics: Find threats before they become a problem
  • Traffic Detection: Identify suspicious traffic on the network
  • Integrated Endpoint and Network: Combines two solutions in one product

Key Features

Each of these key features work together to give your endpoints high levels of protection against malware, viruses and hackers.

So Long Malware

Sophos Endpoint provides features that help to prevent the spread of viruses and malware. This is accomplished by isolating items or (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Graeme Messina. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/bnLPxrbIWWE/