Main page  /  Enterprise Suite: comprehensive network security solution
    Close   

Enterprise Suite


Enterprise Suite is a comprehensive network security solution that effectively protects against intrusion by targeted hacker attacks or malware threats without the need for signature updates. It also protects against insider threats caused by unauthorized access to sensitive data and system configuration changes.

Request consultation
Download evaluation software

Overview


By controlling the launch and activity of all applications and system drivers, Enterprise Suite enables effective protection of endpoints against all types of malware and vulnerability exploits without the need for signature updates. This approach also blocks zero-day threats and user activity such as unauthorized information or device access, launching unapproved applications, and other actions that run counter to corporate security policies.


User-driven rules for application activity, file system and registry access, peripheral device and network resource access, combined with monitoring and logging, allow administrators to control and block malicious or unwittingly-risky employee activity. Centralized management and modular architecture significantly reduce the cost of security administration.


Components


Enterprise Suite comprises the following modules:



Why Enterprise Suite?


Protection against all types of malicious software and hacker attacks
Dynamic integrity control

Blocks the launch of hidden applications; new application launches are blocked until the administrator is able to determine whether the application should be allowed to run.

Dynamic sandbox

Unknown or potentially dangerous applications are launched in asandbox so they cannot affect other processes or the system itself. This method allows malicious activity to be blocked before updated signature databases and vulnerability patches are available.

Application activity control

Controls how different applications are permitted to access files and folders, USB drives, registry keys, external devices, and network resources. User-driven rules can be created to control application activity.

Targeted software protection

Enables custom protection to be implemented for specific software in the following ways:

  • Application consistency control. Control over program code changes ensures that applications cannot be launched if the executable code has been modified.
  • Application executable code protection. Prevent executable modules from being modified by other applications.
  • Application data protection. Disable read/write access to application data files and registry keys for all other applications.

User activity control and data loss prevention

Cutting edge technologies

Easy to deploy and manage

Centralized management

More about Centralized management

Key features

System Requirements

SafenSoft, 2004-2019. All rights are reserved.