ALL VENDORS WITH ONE SYSTEM
Operate your security with the United Control Center, the control system for the United Endpoint Protector. The system combines the central management of all vendors and allows operations in large environments too. You can thus monitor your endpoints, receive all security information at a glance and immediately react to every occurring situation. When required, you can activate additional vendors, in just a few minutes, across the network.
Illustrate your environment in the flexible tree structure of the United Control Center, for an intuitive overview. You can thus immediately see which endpoints are currently turned on, who is reaching a critical state and use the criteria-based labels for the presentation of relevant system groups.
FIND UNMANAGED DEVICES
To ensure the security of your IT infrastructure, you must know your environment. The United Control Center will help you with this, using several methods. Monitor your network with Neighborhood Watch or connect your Active Directory domains, to discover unmanaged devices. You can then immediately include them in the administration with Drag&Drop or fully automatically.
SECURELY DELIVERED IN THE NETWORK
With the integrated software distribution, you can provide all technologies with security updates and install any software packets. To prevent the files being manipulated, the United Control Center is equipped with encrypted update sources. To reduce the network traffic, you can position these at strategic points and cascade them at will.
DEPLOYMENT CONTROL OF ALL VENDORS
The license management of the United Control Center does not just give a clear presentation of your licence use, it also allows the technology control in the entire network. With just a few mouse clicks, you can enable and disable the security vendors on the desired endpoints. Even in an emergency, additional technologies can thus be deployed across the company in just a few minutes.
FOR EACH APPLICATION AREA
Each part of an IT infrastructure has its own performance and security requirements. With the policy management of the United Control Center, you can take all the requirements into account. The optimum configuration of each technology can be set for each application area, each endpoint and each feature. The coloured labels will thereby help you to keep a clear overview.
ALL INFORMATION AT A GLANCE
Regardless of who you choose, the United Control Center unify the data of all the technologies used. All technical and security-relevant information is clearly displayed on dashboards, so that you can immediately react and make strategic decisions. The Click&View operating concept thereby provides you with very simple handling and data filtering.
IN CASE OF NOTABLE EVENTS
You will be informed as soon as a critical incident occurs in your environment. The United Control Center can inform you immediately by e-mail, when events occur that you have determined. This makes security operation possible without problems, even with a small team.
HOW IT WORKS
The core of the United Control Center is the UCC server. You can install this on any current Windows server and it is the central connection point of all the components. To store all the information, a Microsoft SQL database is used, which you can place on any SQL server. The interface for your administrators is the UCC console, an MMC based interface that can be installed on any supported Windows operating system and that allows working in real time.
The UCC Agent is used to manage your endpoints. You can install this on any computer system that you would like to manage. It is responsible for the communication with the UCC Server and apply all your orders in the United Endpoint Protector. For security reasons and to observe the legal IT compliance, all communication paths between the components are encrypted with the latest TLS standard.
- Windows 2008 R2
- Windows 2012 R2
- Windows 2016
- Microsoft SQL 2008 R2
- Microsoft SQL 2012
- Microsoft SQL 2014
Take part in the PreRelease program and join the exclusive group, which discover the redundant protection first.