ENDPOINT PROTECTION
WITH UNITED FORCES

The United Endpoint Protector is the first EPP solution for the agile operation of cyber security vendors. Implement your strategic decisions by click, flexibly combine the desired vendors and receive maximum protection against cyber threats.

Download Now
Agile Operation

AGILE OPERATING MODE

The United Endpoint Protector (UEP) is the first EPP solution that follows a new operating mode. Instead of having to choose a single vendor and install its individual solution, in this collaborative system, various vendors are available for you by click. To do this, install the UEP instead of your previous security solution. You can then activate the embedded vendors at any time with the help of technology licenses and combine them in the various security features.

Read more…

UNITED ENDPOINT PROTECTOR

BECAUSE 99.9% IS NOT ENOUGH

United Endpoint Protector

KNOWN THREATS

Many of the world’s emerging threats are known and fill the huge databases of the security vendors. Just because a threat is known, it is not less dangerous. Combine the knowledge levels of the vendors in the United Endpoint Protector for complete coverage of all known threats.

UNKNOWN THREATS

Hundreds of thousands of new threats and attack patterns spread daily and existing ones change. Every security vendor is prepared for this, but uses different techniques and procedures to detect them. Combine a wide variety of approaches with the United Endpoint Protector to be prepared for all unknown threats.

Avira Logo
Cyren Logo
IKARUS Security Software Logo

SECURITY FEATURES OVERVIEW

The United Endpoint Protector is equipped with a wide variety of security features for threat defense. You can selectively use them for your endpoint security and decide for each feature which security vendors and in which combinations you want to activate them.

Download Now

FILE SECURITY

FILE SECURITY

Most of the threats that arise are based on malicious files. With File Security, you can monitor all file accesses in real time and have them evaluated by the desired vendors. Use multiple vendors’ technologies and knowledge levels to stop known and unknown file-based threats before they can be executed.

BEHAVIOR SECURITY

BEHAVIOR SECURITY (coming soon)

Not all threats are file-based or can be identified using code analysis. Behavior Security therefore allows you to monitor the behavior of your processes. Activate suitable security vendors to evaluate the behavior, identify malicious activities and stop them before greater damage can occur.

MEMORY SECURITY

MEMORY SECURITY

The memory of your endpoint is a popular target, especially for file-less threats. Memory Security allows you to perform a regular, automated, forensic examination of the memory. With up to 8 different forensic methods, it reveals any code execution, saves the evidence and allows the evaluation through multiple vendors.

REGISTRY SECURITY

REGISTRY SECURITY

The Windows Registry is often used by threats to store their own data, to manipulate existing ones or to ensure their own re-execution after a restart. With Registry Security, you can monitor all accesses to the Windows Registry in real time and prevent tampering and nesting of threats.

ON-DEMAND SCANS

ON-DEMAND SCANS

While inactive threats are not an immediate threat, they can quickly become one. Therefore, use on-demand scans to hunt for previously undetected threats before they can become active. With the resource control provided, you decide how much CPU usage should be used for this.

BLACKLIST

BLACKLIST

In addition to various security vendors, the Blacklist is available for activation in every security feature. This compares the respective data with a list of manually added entries and reports you matches. Use it to block desired accesses or look for IOC’s (Indicators of Compromise).

ACTIONS

ACTIONS

In addition to the reliable detection of threats, their automatic elimination is essential for endpoint protection. By using multiple security vendors at the same time, you not only benefit from the combinable countermeasures. For the first time, you can make the automatic actions dependent on the agreement between vendors and thus achieve protection against false alarms.

NEW STRATEGIES

NEW STRATEGIES

The quick use of security vendors by click and their flexible combination options open up new dimensions for your security strategy. Whether permanent multi-vendor use, establishment of monitoring instances, segmentation or use in emergencies. You can decide at any time which vendor you want to activate on which endpoints, in which feature, at what time.

SUPPORTED PLATFORMS

  • Windows 10
  • Windows 2012 R2
  • Windows 2016

  • Windows 2019

TESTED AND CERTIFIED QUALITY

The United Endpoint Protector is continuously tested and certified by independent institutions. This ensures optimal compatibility with the operating system and achieves the highest security standards.

VB100 June 2020
VB100 April 2020
Windows 10 Certified
Windows Server 2019 Certified
Windows Server 2016 Certified
Windows Server 2012 R2 Certified
United Endpoint Protector Box

Start now your 30 days free trial with all available security vendors!

Download Now