1. Prevention of Endpoint Virus and Malicious Code
Combined with self-developed QOWL engine, cloud engine, artificial intelligence engine and other multi-engine technologies, it has active defense technologies such as isolation protection, 5-layer entrance protection, 7-layer system protection, and 8-layer application protection, effectively blocking known and unknown viruses.
2. Control of O&M
Ø Identify endpoint assets across the network automatically, monitor system status and alarm in real-time to ensure business continuity.
Ø Employ diverse measures such as control of unauthorized external contact and peripheral equipment, , process control, host firewall, and desktop security reinforcement to improve endpoint security
Ø Scan and correlate endpoint vulnerabilities across the network, simplify patch O&M, realize automatic patch verification, reduce human participation, improve efficiency, and reduce the risk of patch deployment.
Ø Security audit of whole network files and peripheral use, management at multiple levels and alarming in a variety of ways, all aimed at achieving efficient control over the whole network.
3. Coordinated Response and Neutralization
It provides abundant endpoint alarm events and original behavior information, which are distributed to third-party big data analysis platforms via syslog to help business clients establish big data-enabled awareness over their internal network and endpoints.