CENTRAL MANAGEMENT

ALL VENDORS WITH ONE SYSTEM

Operate your security with the United Control Center, the control system for the United Endpoint Protector. The system combines the central management of all vendors and allows operations in large environments too. You can thus monitor your endpoints, receive all security information at a glance and immediately react to every occurring situation. When required, you can activate additional vendors, in just a few minutes, across the network.

United Control Center - Endpoints
ENDPOINTS

ENDPOINTS

CLEARLY MANAGED

Illustrate your environment in the flexible tree structure of the United Control Center, for an intuitive overview. You can thus immediately see which endpoints are currently turned on, who is reaching a critical state and use the criteria-based labels for the presentation of relevant system groups.

DISCOVERY

DISCOVERY

FIND UNMANAGED DEVICES

To ensure the security of your IT infrastructure, you must know your environment. The United Control Center will help you with this, using several methods. Monitor your network with Neighborhood Watch or connect your Active Directory domains, to discover unmanaged devices. You can then immediately include them in the administration with Drag&Drop or fully automatically.

United Control Center - Discovery
United Control Center - Updates
UPDATES

UPDATES

SECURELY DELIVERED IN THE NETWORK

With the integrated software distribution, you can provide all technologies with security updates and install any software packets. To prevent the files being manipulated, the United Control Center is equipped with encrypted update sources. To reduce the network traffic, you can position these at strategic points and cascade them at will.

LICENSES

LICENSES

DEPLOYMENT CONTROL OF ALL VENDORS

The license management of the United Control Center does not just give a clear presentation of your licence use, it also allows the technology control in the entire network. With just a few mouse clicks, you can enable and disable the security vendors on the desired endpoints. Even in an emergency, additional technologies can thus be deployed across the company in just a few minutes.

United Control Center - Licenses
United Control Center - Policies
POLICIES

POLICIES

INDIVIDUAL CONFIGURATIONS
FOR EACH APPLICATION AREA

Each part of an IT infrastructure has its own performance and security requirements. With the policy management of the United Control Center, you can take all the requirements into account. The optimum configuration of each technology can be set for each application area, each endpoint and each feature. The coloured labels will thereby help you to keep a clear overview.

REPORTS

REPORTS

ALL INFORMATION AT A GLANCE

Regardless of who you choose, the United Control Center unify the data of all the technologies used. All technical and security-relevant information is clearly displayed on dashboards, so that you can immediately react and make strategic decisions. The Click&View operating concept thereby provides you with very simple handling and data filtering.

United Control Center - Reporting
United Control Center - Alerting
ALERTING

ALERTING

IN CASE OF NOTABLE EVENTS

You will be informed as soon as a critical incident occurs in your environment. The United Control Center can inform you immediately by e-mail, when events occur that you have determined. This makes security operation possible without problems, even with a small team.

HOW IT WORKS

The core of the United Control Center is the UCC server. You can install this on any current Windows server and it is the central connection point of all the components. To store all the information, a Microsoft SQL database is used, which you can place on any SQL server. The interface for your administrators is the UCC console, an MMC based interface that can be installed on any supported Windows operating system and that allows working in real time.

The UCC Agent is used to manage your endpoints. You can install this on any computer system that you would like to manage. It is responsible for the communication with the UCC Server and apply all your orders in the United Endpoint Protector. For security reasons and to observe the legal IT compliance, all communication paths between the components are encrypted with the latest TLS standard.

SUPPORTED
PLATFORMS

  • Windows 2008 R2
  • Windows 2012 R2
  • Windows 2016

SUPPORTED
DATABASES

  • Microsoft SQL 2008 R2
  • Microsoft SQL 2012
  • Microsoft SQL 2014

Take part in the PreRelease program and join the exclusive group, which discover the redundant protection first.

READ MORE