ENDPOINT SECURITY

WITH UNITED FORCES

    |    Cybersecurity Solutions    |    Endpoint Security

COLLABORATIVE ENDPOINT SECURITY

The United Endpoint Protector is the first endpoint security solution for the agile operation of cyber security vendors. Implement your strategic decisions by click, flexibly combine the desired vendors and receive maximum protection against cyber threats.

BECAUSE 99.9% IS NOT ENOUGH

KNOWN THREATS

Many of the world’s emerging threats are known and fill the huge databases of the security vendors. Just because a threat is known, it is not less dangerous. Combine the knowledge levels of the vendors in the United Endpoint Protector for complete coverage of all known threats.

UNKNOWN THREATS

Hundreds of thousands of new threats and attack patterns spread daily and existing ones change. Every security vendor is prepared for this, but uses different techniques and procedures to detect them. Combine a wide variety of approaches with the United Endpoint Protector to be prepared for all unknown threats.

Avira Logo
Cyren Logo
IKARUS Security Software Logo

THE NEW OPERATING MODE FOR ENDPOINT SECURITY

With the United Endpoint Protector, individual security products no longer have to be installed in order to use the respective security providers. Instead, the system already includes everything that is necessary for their use. This makes the new operating mode available, how security companies can be used.

Installation of collaborative Product
Single Arrow
Single Arrow vertically
Unlock Cybersecurity Providers
Double Arrows
Double Arrow vertically
Agile Activation of Technologies

01 INITIAL INSTALLATION

The United Endpoint Protector contains all available vendor modules in an inactive form and is installed instead of a traditional product.

02 UNLOCK PROVIDERS

The inactive vendor modules can be unlocked at any time, in any combination, with the help of technology licenses and with this are available for use.

03 ACTIVATE TECHNOLOGIES

After unlocking, the technologies of the selected providers appear in the system and can be activated in the various security features as desired.

Agile operation of cybersecurity companies with the United Endpoint Protector.

ENDPOINT SECURITY FEATURES OVERVIEW

The United Endpoint Protector is equipped with a wide variety of security features for threat defense. You can selectively use them for your endpoint security and decide for each feature which security vendors and in which combinations you want to activate them.

Download Now

FILE SECURITY

FILE SECURITY

Most of the threats that arise are based on malicious files. With File Security, you can monitor all file accesses in real time and have them evaluated by the desired vendors. Use multiple vendors’ technologies and knowledge levels to stop known and unknown file-based threats before they can be executed.

BEHAVIOR SECURITY

BEHAVIOR SECURITY (coming soon)

Not all threats are file-based or can be identified using code analysis. Behavior Security therefore allows you to monitor the behavior of your processes. Activate suitable security vendors to evaluate the behavior, identify malicious activities and stop them before greater damage can occur.

MEMORY SECURITY

MEMORY SECURITY

The memory of your endpoint is a popular target, especially for file-less threats. Memory Security allows you to perform a regular, automated, forensic examination of the memory. With up to 8 different forensic methods, it reveals any code execution, saves the evidence and allows the evaluation through multiple vendors.

REGISTRY SECURITY

REGISTRY SECURITY

The Windows Registry is often used by threats to store their own data, to manipulate existing ones or to ensure their own re-execution after a restart. With Registry Security, you can monitor all accesses to the Windows Registry in real time and prevent tampering and nesting of threats.

ON-DEMAND SCANS

ON-DEMAND SCANS

While inactive threats are not an immediate threat, they can quickly become one. Therefore, use on-demand scans to hunt for previously undetected threats before they can become active. With the resource control provided, you decide how much CPU usage should be used for this.

BLACKLIST

BLACKLIST

In addition to various security vendors, the Blacklist is available for activation in every security feature. This compares the respective data with a list of manually added entries and reports you matches. Use it to block desired accesses or look for IOC’s (Indicators of Compromise).

ACTIONS

ACTIONS

In addition to the reliable detection of threats, their automatic elimination is essential for endpoint protection. By using multiple security vendors at the same time, you not only benefit from the combinable countermeasures. For the first time, you can make the automatic actions dependent on the agreement between vendors and thus achieve protection against false alarms.

NEW STRATEGIES

NEW STRATEGIES

The quick use of security vendors by click and their flexible combination options open up new dimensions for your security strategy. Whether permanent multi-vendor use, establishment of monitoring instances, segmentation or use in emergencies. You can decide at any time which vendor you want to activate on which endpoints, in which feature, at what time.

SUPPORTED PLATFORMS

  • Windows 10
  • Windows 2012 R2
  • Windows 2016

  • Windows 2019

TESTED AND CERTIFIED QUALITY

The United Endpoint Protector is continuously tested and certified by independent institutions. This ensures optimal compatibility with the operating system and achieves the highest security standards.

VB100 June 2020
VB100 April 2020
Windows 10 Certified
Windows Server 2019 Certified
Windows Server 2016 Certified
Windows Server 2012 R2 Certified

Start now your 30 days free trial with all available security vendors!

Download Now

ADDITIONAL INFORMATION

Collective Defence in Cybersecurity
Agile Cybersecurity Operation
Cybersecurity Companies

COLLECTIVE CYBER DEFENCE

The evolution of cyber threats creates a threat landscape that is steadily increasing in size, complexity and diversity. It has thus become impossible for a single security company to identify and prevent all global threats in good time. One of the main tasks of the association is therefore the technical cooperation of security providers to enable a collective cyber defence. Find out here how the interaction of independent security technologies can help you with cybersecurity.

AGILE CYBERSECURITY OPERATION

Not only cyber threats, but also the protective measures to be taken pose ever greater challenges for companies. From planning to implementation to ongoing operations, cybersecurity became a complex issue. Tabidus Technology therefore offers the use of security companies in an agile form. Find out here how the new way of dealing with security technologies works, how you can enforce your strategic decisions on click and how that simplifies operations.

AFFILIATED CYBERSECURITY COMPANIES

Get to know the security companies and their approaches to cyber defence that are already available through the Tabidus Technology Association. Each of our providers has its own individual technology and level of knowledge in order to detect known and unknown cyber threats. Select the vendors that are right for you at any time, combine them as you wish and put the providers into operation by click.

Read more

Read more

Read more

Tabidus Technology Logo
Widget Separator
Avira Logo
Cyren Logo
Ikarus Logo