ENDPOINT SECURITY

WITH THE FIRST COLLABORATIVE SECURITY SOLUTION

United Endpoint Protector Logo

    |    Security Solutions    |    Endpoint Security

WHAT IS A COLLABORATIVE ENDPOINT SECURITY SOLUTION?

Until now, in order to use the technology and security potential of a cybersecurity provider, you had to install their individual security product. A collaborative security solution, on the other hand, provides the basis for a wide variety of providers. It collects the data to be examined, coordinates the cooperation of the different technologies and enables the uniform operation of all providers.

The United Endpoint Protector (UEP) is the first collaborative security solution for the endpoint security of Windows clients and servers. Use the UEP to flexibly activate the desired providers, combine them as you wish and benefit from several security potentials at the same time.

THE THREE MAJOR TASKS IN ENDPOINT SECURITY

Every security product must master three different disciplines for reliable endpoint security. How does the United Endpoint Protector deal with these challenges?

01

DATA COLLECTION FOR ENDPOINT SECURITY

In order for cyber threats to be detected on an endpoint, the data must first be determined for an analysis. Finding and providing all security-relevant activities and information is therefore the first important discipline of any security product for successful endpoint security. The United Endpoint Protector uses the following data collection methods to make them available to the various security providers for analysis.

Endpoint Security - United Endpoint Protector - File Security
Endpoint Security - United Endpoint Protector - Registry Security

FILE ANALYSIS

A large part of cyber threats consists of malicious code that is distributed and executed in the form of files. The File Security of the United Endpoint Protector therefore monitors all file accesses on the local hard drives, connected network drives and used removable media in real time.

REGISTRY ANALYSIS

The Microsoft Windows Registry is a popular target for cyber threats for information gathering, to manipulate existing data and to save one’s own. The Registry Security of the United Endpoint Protector therefore monitors all access to the Windows Registry in real time.

Endpoint Security - United Endpoint Protector - Memory Security
Endpoint Security - United Endpoint Protector - OnDemand Scan

MEMORY ANALYSIS

The main memory of an endpoint can be the target of cyber attacks in various ways. Malware uses the main memory to execute malicious code; running processes can be manipulated and used to disguise activities. The Memory Security of the United Endpoint Protector therefore regularly checks the memory using multiple forensic methods from Rekall Forensics and extracts all content for precise analysis.

DATA-AT-REST ANALYSIS

The danger of cyber threats does not only come from activities that are currently taking place, but also from data at rest. These can be dormant threats or threats that have not yet been recognized, which real-time analyzes may not even be able to check. The United Endpoint Protector therefore offers on-demand scans in order to check various areas of an endpoint in a time-controlled manner.

SCREENSHOTS

02

THREAT DETECTION FOR ENDPOINT SECURITY

Determining the security activities on a computer is only the first step in endpoint security. In a further step, the threats must be identified in the flood of data. That is almost impossible for a human. That is why there is a need for security technologies that carry out these assessments automatically. Compared to a single security product, several security providers are available in a collaborative security solution such as the United Endpoint Protector. You can decide for yourself at any time which providers, in which combinations, you want to use for which data checks. Activating a provider works with just a few clicks. Each activated provider then checks the provided data independently of one another and returns their assessment for each data block. The following providers are currently available for selection in the United Endpoint Protector.

Avira Logo
Cyren Logo
IKARUS Security Software Logo

Blacklist

In addition to the technologies of the various security providers, the United Endpoint Protector also has a Blacklist available to you. With this you can make your own decisions and classify any objects as malicious, regardless of the analysis results of the providers.

03

THREAT HANDLING FOR ENDPOINT SECURITY

The third discipline in endpoint security is dealing with cyber threats after they are detected. Detected threats should be dealt with automatically, rendered harmless or even prevented. However, a side effect of threat detection are false alarms (False Positives). These occur when a security provider mistakenly identifies legitimate activity as a threat. The United Endpoint Protector therefore takes a different approach in this respect too, compared to single security products. In the collaborative security system, you can make the automatic actions for handling threats dependent on the agreement of security providers. For example, a file should only be deleted if at least two providers agree that it is a threat. If, on the other hand, only one provider reports a threat, only access should be blocked, for example. This provides protection against the negative effects of a false positive in the automatic handling of threats. The following actions are available to you in the United Endpoint Protector.

Logging

Block

Disinfect

Quarantine

Delete

THE NEW OPERATING MODE FOR ENDPOINT SECURITY

A collaborative security solution like the United Endpoint Protector is fundamentally changing the way how security providers can be used for endpoint security. In order to use the technology and the potential of a provider, you no longer have to install their individual security product. Instead, the various providers, technologies and levels of knowledge are embedded in the collaborative system and can be easily activated on click using the new operating mode.

Product Installation
Single Arrow
Single Arrow
Unlock Technologies
Double Arrow
Double Arrow
Technology Activation

01 INITIAL INSTALLATION

The United Endpoint Protector contains all available providers in an inactive form and is installed instead of a traditional product.

02 UNLOCK PROVIDERS

The inactive providers can be unlocked at any time, in any combination, with the help of technology licenses and with this are available for use.

03 ACTIVATE TECHNOLOGIES

After unlocking, the technologies of the selected providers appear in the system and can be activated in the various security features as desired.

SUPPORTED PLATFORMS

  • Windows 10
  • Windows 2012 R2
  • Windows 2016

  • Windows 2019

TESTED AND CERTIFIED QUALITY

The United Endpoint Protector is continuously tested and certified by independent institutions. This ensures optimal compatibility with the operating system and achieves the highest security standards.

Virus Bulletin Logo
Microsoft Logo
Cyber Defence with United Endpoint Protector Product Box

Start now your 30 days free trial of the United Endpoint Protector

ADDITIONAL INFORMATION

Collective Defence in Cybersecurity
Agile Cybersecurity Operation

COLLECTIVE CYBER DEFENCE

The evolution of cyber threats creates a threat landscape that is steadily increasing in size, complexity and diversity. It has thus become impossible for a single security company to identify and prevent all global threats in good time. One of the main tasks of the association is therefore the technical cooperation of security providers to enable a collective cyber defence. Find out here how the interaction of independent security technologies can help you with cybersecurity.

AGILE CYBERSECURITY OPERATION

Not only cyber threats, but also the protective measures to be taken pose ever greater challenges for companies. From planning to implementation to ongoing operations, cybersecurity became a complex issue. Tabidus Technology therefore offers the use of security companies in an agile form. Find out here how the new way of dealing with security technologies works, how you can enforce your strategic decisions on click and how that simplifies operations.

CYBERSECURITY ASSOCIATION

Tabidus Technology is a cybersecurity association that unites independent security companies in collaborative security solutions. The association thus represents an alternative to the use of individual security providers. Find out more about our tasks, goals and how we, as a holistic contact, can help you implement your cyber defence.

Read more

Read more

Read more