UNITED ENDPOINT PROTECTOR

ENDPOINT PROTECTION WITH UNIFIED VENDORS

The United Endpoint Protector is the first agile security system for your Windows clients and server. Equipped with independent technologies, it offers you a wide range of antimalware vendors, which are available to you by click. Decide yourself which ones you want to use, combine all technologies at will and adjust your selection to each of your application areas.

START FREE TRIAL

KEY BENEFITS

MAXIMUM
DETECTION RATES

Achieve a significantly higher detection accuracy for malware, through the combined variety of the protection potentials of different vendors and technologies.

PROTECTION AGAINST
FALSE-POSITIVES

Avoid the negative effects of false alarms through configurable minimum-matching between vendors before automatic cleaning is performed.

SHORTER
REACTION TIMES

Receive the protection measures against new threats faster than before, as soon as any one of your choosen vendors makes them available.

.
FLEXIBILITY

Choose the vendors freely according to your needs, adapted to each of your application areas and make flexible changes at any time.

HOT-SWAP
CHANGE

Activate and deactivate technologies with a single keystroke, during running operations, without software roll-out, network wide, even in an emergency.

UNIFIED
MANAGEMENT

Manage all vendors and technologies through a common user interface, with minimum maintenance work and know-how.

COMPLIANCE
FULFILMENT

Correspond with diverse redundancy to the legal requirements for IT compliance, with true multi-vendor strategies.

.
SAVINGS

Simplified evaluation of technologies, minimisation of external consulting, elimination of software roll-outs and extensive training sessions.

HOW IT WORKS

The United Endpoint Protector offers you new possibilities for technology usage. For the first time, you can flexibly determine the anti-malware technologies according to each security feature, each endpoint and each application area. Decide yourself whether to use a single vendor or if you would like to design your security redundantly with several technologies. The combination possibilities are unlimited. Your decisions do not have to be made for eternity, either. With only a few mouse clicks, you can rearrange the security vendors, switch off currently running ones or bring new ones into effect.

For this, install the United Endpoint Protector on your Windows endpoint, instead of a traditional virus scanner. Then you can decide at any time which vendors you would like to use. You can unlock them, without a new software roll-out, simply with our technology licences. The technologies available with this can then be activated and combined with others in the various security features. You will also be supported in this by the United Control Center, to implement your decisions across the network.

SUPPORTED PLATFORMS

  • Windows 7 (x64)
  • Windows 8 (x64)
  • Windows 10 (x64)
  • Windows 2008 R2
  • Windows 2012 R2
  • Windows 2016

LAYERED

DEFENSE

Malware has developed into complex software over the course of time. Modern variants no longer consist of a single file, instead they perform complex actions. As well as the creation of malicious files, malicious processes are started, and legitimate ones are attacked. Erroneous entries in the Windows Registry are created and existing ones are manipulated. Each of these behaviours is often well camouflaged, not recognisable with the naked eye and quickly has catastrophic consequences.

A smart attacker requires a smart opponent, the United Endpoint Protector! Its security features cover all the different paths along which malware can move on a device. On each of these levels, you can strategically place the various anti-malware technologies to detect and fight all malicious activities.

START FREE TRIAL
FILE SECURITY

FILE SECURITY

REAL-TIME MONITORING OF ALL
FILE OPERATIONS

Malicious files are the malware incident factor no. 1, which can arrive on your endpoint in a variety of ways. With the File Security, you can monitor every file access on your hard drives in real time and automatically check them, with multiple vendors. You can thus fight all file-based actions of a malware and prevent an infection, usually in the beginning stage.

START FREE TRIAL
United Endpoint Protector - File Security
United Endpoint Protector - Process Security
MEMORY SECURITY

MEMORY SECURITY

FORENSIC INSPECTION
OF THE MEMORY

The memory is used by malware to execute malicious codes on your endpoint. You should thus have it regularly checked by the Process Security. With up to 8 forensic methods, it covers every code execution, which you can immediately have evaluated by multiple vendors. This eliminates actively executed malware from the memory and provides detailed feedback about all processes.

START FREE TRIAL
REGISTRY SECURITY

REGISTRY SECURITY

REAL-TIME MONITORING OF THE
WINDOWS REGISTRY

The Windows Registry is a favourite attack target for malware to create auto-start entries, storing their own data and modify existing entries. Monitor all manipulation attempts with the Registry Security, even before they are made. You can have all changes checked for harmful signs, in real time, and thus prevent malware from implanting.

START FREE TRIAL
United Endpoint Protector - Registry Security
United Endpoint Protector - OnDemand
ON-DEMAND SCANS

ON-DEMAND SCANS

ACTIVE CHECKING OF ALL AREAS OF
THE COMPUTER

Actively hunt for malware, with multiple vendors. Comb through all the areas of your endpoint, for undiscovered or inactive threats. The CPU load for this can amount to less than 5 %, to avoid disturbing the user.

START FREE TRIAL
MULTIPLE CLOUDS

MULTIPLE CLOUDS

LIVE INFORMATION AND
ARTIFICIAL INTELLIGENCE

Immediately receive the latest information about known malware and zero-day attacks, as well as access to artificial intelligence from the research centres of the vendors. In each security feature, you can enable various clouds for this purpose. These information sources are then automatically included in the fight against malware. Your detection rates are thus always up to the latest state of knowledge.

START FREE TRIAL
United Endpoint Protector - Actions
MULTIPLE MALWARE REMOVAL

MULTIPLE MALWARE REMOVAL

ENTIRE REMOVAL OF THREAT

Not just detecting, but also the clean-up of malware can be performed with joint forces. You can thus ensure that the threat is not just partially removed. To avoid false alarms in this process, you can set the actions to be executed according to the number of vendors that have recognised a threat.

START FREE TRIAL
BLACKLIST

BLACKLIST

MANUAL DETECTION RATES

A piece of malware is not yet recognised by the technologies used? No problem! In each security feature, you can define unwanted objects that should be treated as malware. You can thus create a preventive protection or immediately act in an emergency.

START FREE TRIAL
United Endpoint Protector - Blacklist
United Endpoint Protector - Dashboard
STATUS REPORTS

STATUS REPORTS

YOUR SECURITY AT A GLANCE

Regardless of how many vendors you currently use, in which features. All information flows together into an integrated status-reporting. You can evaluate your security status at a glance and receive all the information to optimise your configuration.

START FREE TRIAL
United Malware Protection

Tabidus Technology is an association that unites the global vendors of antimalware technologies. Our mission is to facilitate the technical collaboration of our members and provide them to enterprises, to allow better and easier protection against the dangers of the cyber world. Read more…

START FREE TRIAL

NEW FLEXIBILITY

FOR YOUR SECURITY

Get to know the new possibilities for the design of your security concept that the United Endpoint Protector offers you. For every environment, every application area, at any time, the optimum mix of technologies.

READ MORE

Take part in the PreRelease program and join the exclusive group, which discover the redundant protection first.

READ MORE