UNITED
MALWARE PROTECTION
The agile way to use cybersecurity vendors and anti-malware technologies in companies. Activate your desired vendors by click and combine the protection potentials with each other, instead of relying on individual solutions.
ONE SYSTEM FOR ALL
We unite the global cybersecurity vendors in a collaborative system and provide the operation of the various anti-malware technologies in an agile manner, for the malware protection of companies. For this, each vendor is embedded in our Dynamic Multi-Core scan framework, in the form of a technology core. The scan framework allows you to activate the desired technologies at any time by click and use them to identify cyber threats. Several technology cores can be activated at the same time and combined with each other as desired. The resulting threat intelligence can be used in the various security features of our products and adapted to every need.
The agile use of anti-malware technologies is a new way of dealing with cybersecurity vendors. Instead of having to choose a single provider, you can flexibly activate the technologies of the vendors in the collaborative system. This new operating mode for malware protection works in three simple steps.
ASSOCIATION |
Combinable threat detection |
Collaborative false alarm protection |
Response time to ZeroDay by fastest vendor |
Flexible vendor choice |
Hot-swap change of vendor |
Flexibly adaptable to application areas |
Multi-Vendor security strategy |
Emergency handling through additional vendor activation |
Compliance fulfillment through true Multi-Vendor approach |
INDIVIDUAL PROVIDER |
Single threat detection |
Single QA for false alarm protection |
Response time to ZeroDay depends on case |
Vendor choice once at the beginning |
Change of vendor means reimplementation |
One for every application area |
Single-Vendor security strategy |
Emergency handling through manual cleaning tool |
Compliance fulfillment through pseudo Multi-Vendor approach |
UNITED ENDPOINT PROTECTOR
The United Endpoint Protector is the first collaborative anti-malware system for Microsoft Windows. Equipped with the Dynamic Multi-Core framework, it provides you various technology cores for agile use. You can activate the available cybersecurity vendors and anti-malware technologies in any combination in the different security features for your endpoint protection:
FILE SECURITY |
MEMORY SECURITY |
REGISTRY SECURITY |
ON-DEMAND SCANS |
MULTIPLE CLOUDS |
ENTIRE MALWARE REMOVAL |
BLACKLIST |
UNIFIED REPORTING |

The Avira scan engines utilize the most advanced machine learning, heuristics and generics to identify and block malicious code from infiltrating networks and executing on devices.

Cyren provides an array of proprietary technologies, ranging from algorithms and behavioral analytics to big data, machine learning, and advanced threats research.

The IKARUS scan.engine is one of the world’s best carrier-grade content scanning engines. It detects, extracts, analyses and eliminates malware, vulnerabilities, and exploits in virtually all file systems and archives.
ANTI-MALWARE TECHNOLOGIES
The anti-malware technologies available include all modern approaches to identifying malware. In addition to classic signatures, our vendors are increasingly relying on Behavior-Heuristics, Machine Learing, Artificial Intelligence, Sandboxing and Simulation, as well as support from the Clouds. Get to know the different approaches and combine them as desired for your malware protection.
The United Control Center is the central management solution for agile malware protection in companies. Decide from a central location which anti-malware technologies, from which cybersecurity vendor, in which part of your environment should be active. Introduce a new vendor in just a few minutes and get uniform management across all providers.