WITH UNIFIED VENDORS
The United Endpoint Protector is the first diverse redundant security system for your Windows clients and server. Equipped with multiple technology cores, it offers you a wide range of security vendors, which are available to you with a single keystroke. Decide yourself which ones you want to use, combine all technologies at will and adjust your selection to each of your application areas.
HOW IT WORKS
The United Endpoint Protector offers you new possibilities for technology usage. For the first time, you can flexibly determine the anti-malware technologies according to each security feature, each endpoint and each application area. Decide yourself whether to use a single vendor or if you would like to design your security redundantly with several technologies. The combination possibilities are unlimited. Your decisions do not have to be made for eternity, either. With only a few mouse clicks, you can rearrange the security vendors, switch off currently running ones or bring new ones into effect.
For this, install the United Endpoint Protector on your Windows endpoint, instead of a traditional virus scanner. Then you can decide at any time which vendors you would like to use. You can unlock them, without a new software roll-out, simply with our technology licences. The technologies available with this can then be activated and combined with others in the various security features. You will also be supported in this by the United Control Center, to implement your decisions across the network.
- Windows 7 (x64)
- Windows 8 (x64)
- Windows 10 (x64)
- Windows 2008 R2
- Windows 2012 R2
- Windows 2016
Malware has developed into complex software over the course of time. Modern variants no longer consist of a single file, instead they perform complex actions. As well as the creation of malicious files, malicious processes are started, and legitimate ones are attacked. Erroneous entries in the Windows Registry are created and existing ones are manipulated. Each of these behaviours is often well camouflaged, not recognisable with the naked eye and quickly has catastrophic consequences.
A smart attacker requires a smart opponent, the United Endpoint Protector! Its security features cover all the different paths along which malware can move on a device. On each of these levels, you can strategically place the various anti-malware technologies to detect and fight all malicious activities.
REAL-TIME MONITORING OF ALL
Malicious files are the malware incident factor no. 1, which can arrive on your endpoint in a variety of ways. With the File Security, you can monitor every file access on your hard drives in real time and automatically check them, with multiple vendors. You can thus fight all file-based actions of a malware and prevent an infection, usually in the beginning stage.
OF THE MEMORY
The memory is used by malware to execute malicious codes on your endpoint. You should thus have it regularly checked by the Process Security. With up to 8 forensic methods, it covers every code execution, which you can immediately have evaluated by multiple vendors. This eliminates actively executed malware from the memory and provides detailed feedback about all processes.
REAL-TIME MONITORING OF THE
The Windows Registry is a favourite attack target for malware to create auto-start entries, storing their own data and modify existing entries. Monitor all manipulation attempts with the Registry Security, even before they are made. You can have all changes checked for harmful signs, in real time, and thus prevent malware from implanting.
LIVE INFORMATION AND
Immediately receive the latest information about known malware and zero-day attacks, as well as access to artificial intelligence from the research centres of the vendors. In each security feature, you can enable various clouds for this purpose. These information sources are then automatically included in the fight against malware. Your detection rates are thus always up to the latest state of knowledge.
ENTIRE REMOVAL OF MALWARE
Not just detecting, but also the clean-up of malware can be performed with joint forces. You can thus ensure that the threat is not just partially removed. To avoid false alarms in this process, you can set the actions to be executed according to the number of vendors that have recognised a threat.
YOUR SECURITY AT A GLANCE
Regardless of how many vendors you currently use, in which features. All information flows together into an integrated status-reporting. You can evaluate your security status at a glance and receive all the information to optimise your configuration.
Achieve a significantly higher detection accuracy for malware, through the combined variety of the protection potentials of different vendors and technologies.
Avoid the negative effects of false alarms through configurable minimum-matching between vendors before automatic cleaning is performed.
Receive the protection measures against new threats faster than before, as soon as any one of your choosen vendors makes them available.
Choose the vendors freely according to your needs, adapted to each of your application areas and make flexible changes at any time.
Activate and deactivate technologies with a single keystroke, during running operations, without software roll-out, network wide, even in an emergency.
Manage all vendors and technologies through a common user interface, with minimum maintenance work and know-how.
Correspond with diverse redundancy to the legal requirements for IT compliance, with true multi-vendor strategies.
Simplified evaluation of technologies, minimisation of external consulting, elimination of software roll-outs and extensive training sessions.
FOR YOUR SECURITY
Get to know the new possibilities for the design of your security concept that the United Endpoint Protector offers you. For every environment, every application area, at any time, the optimum mix of technologies.
Take part in the PreRelease program and join the exclusive group, which discover the redundant protection first.