UNITED ENDPOINT PROTECTOR

MULTI-ENGINE ENDPOINT PROTECTION

The United Endpoint Protector is the first universal antivirus solution for your Windows clients and server. Equipped with multiple technologies cores, it offers you – on-premise – a wide range of antimalware vendors, which are available to you by click. Decide yourself which ones you want to use, combine all technologies at will and adjust your selection to each of your application areas.

Try for free

YOUR BENEFITS

Achieve a significantly higher detection accuracy for malware, through the combined variety of the protection potentials of different vendors and technologies.

Avoid the negative effects of false alarms through configurable minimum-matching between vendors before automatic cleaning is performed.

Receive the protection measures against new threats faster than before, as soon as any one of your choosen vendors makes them available.

Choose the vendors freely according to your needs, adapted to each of your application areas and make flexible changes at any time.

Activate and deactivate technologies with a single keystroke, during running operations, without software roll-out, network wide, even in an emergency.

Stop incidents by click through activating additional technologies, which take care within a few minutes network-wide if required.

Manage all vendors and technologies through a common user interface, with minimum maintenance work and required know-how.

Correspond with combined vendors to the legal requirements for IT compliance, with true multi-vendor strategies.

ACTIVATE

SECURITY
TECHNOLOGIES
INSTEAD OF
INSTALLING

HOW IT WORKS

How It Works 1

INSTALL

Install the United Endpoint Protector

Arrow
How It Works 2

UNLOCK

Unlock vendors at any time with license keys

Arrow
How It Works 3

ACTIVATE

Activate the technologies in desired features

The United Endpoint Protector offers you new possibilities for technology usage. For the first time, you can flexibly determine the anti-malware technologies according to each security feature, each endpoint and each application area. Decide yourself whether to use a single vendor or if you would like to design your security redundantly with several technologies. The combination possibilities are unlimited. Your decisions do not have to be made for eternity, either. With only a few mouse clicks, you can rearrange the security vendors, switch off currently running ones or bring new ones into effect. For this, install the United Endpoint Protector on your Windows endpoint, instead of a traditional virus scanner. Then you can decide at any time which vendors you would like to use. You can unlock them, without a new software roll-out, simply with our technology licences. The technologies available with this can then be activated and combined with others in the various security features. You will also be supported in this by the United Control Center, to implement your decisions across the network.

SUPPORTED PLATFORMS

  • Windows 7 (64bit)
  • Windows 8 (64bit)
  • Windows 10 (64bit)
  • Windows 2008 R2
  • Windows 2012 R2
  • Windows 2016
United Endpoint Protector - Layered Defense

LAYERED

DEFENSE

Malware has developed into complex software over the course of time. Modern variants no longer consist of a single file, instead they perform complex actions. As well as the creation of malicious files, malicious processes are started, and legitimate ones are attacked. Erroneous entries in the Windows Registry are created and existing ones are manipulated. Each of these behaviours is often well camouflaged, not recognisable with the naked eye and quickly has catastrophic consequences.

A smart attacker requires a smart opponent, the United Endpoint Protector! Its security features cover all the different paths along which malware can move on a device. On each of these levels, you can strategically place the various anti-malware technologies to detect and fight all malicious activities.

Try for free
FILE SECURITY

FILE SECURITY

REAL-TIME MONITORING OF ALL FILE OPERATIONS

Malicious files are the number one malware incident factor, andcan arrive on your endpoint in a variety of ways. With File Security, you can monitor every file access on your hard drives in real time and automatically check them with multiple vendors. You can thus fight all file-based actions of a malware and prevent an infection, usually right in the beginning stage.

Read more…
Try for free
United Endpoint Protector - File Security
United Endpoint Protector - Process Security
MEMORY SECURITY

MEMORY SECURITY

FORENSIC INSPECTION OF THE MEMORY

Memory is used by malware to execute malicious codes on your endpoint. You should, therefore, have it regularly checked by Memory Security. With up to 8 forensic methods, it covers every code execution, which you can immediately have evaluated by multiple vendors. This eliminates actively-executed malware from the memory and provides detailed feedback about all processes.

Rekall Forensics
Read more…
Try for free
REGISTRY SECURITY

REGISTRY SECURITY

REAL-TIME MONITORING OF THE WINDOWS REGISTRY

The Windows Registry is a favourite attack target for malware to create auto-start entries, storing their own data and modifying existing entries. Monitor all manipulation attempts with the Registry Security, even before they are made. You can have all changes checked for harmful signs, in real time, and thus prevent malware from implanting.

Read more…
Try for free
United Endpoint Protector - Registry Security
United Endpoint Protector - OnDemand
ON-DEMAND SCAN

ON-DEMAND SCAN

ACTIVE CHECKING OF ALL AREAS OF
THE COMPUTER

Actively hunt for malware, with multiple vendors. Comb through all the areas of your endpoint, for undiscovered or inactive threats. The CPU load for this can amount to less than 5 %, to avoid disturbing the user.

The Sleuth Kit - Digital Forensics
Try for free
MULTIPLE CLOUDS

MULTIPLE CLOUDS

LIVE INFORMATION AND ARTIFICIAL INTELLIGENCE

Immediately receive the latest information about known malware and zero-day attacks, as well as access to artificial intelligence from the research centres of the vendors. In each security feature, you can enable various clouds for this purpose. These information sources are then automatically included in the fight against malware. Your detection rates are thus always up to the latest state of knowledge.

Read more…
Try for free
Clouds
United Endpoint Protector - Actions
MULTIPLE CLEANING

MULTIPLE CLEANING

ENTIRE REMOVAL OF MALWARE

Not just detecting, but also the clean-up of malware can be performed with joint forces. You can thus ensure that the threat is not just partially removed. To avoid false alarms in this process, you can set the actions to be executed according to the number of vendors that have recognised a threat.

Read more…
Try for free
BLACKLIST

BLACKLIST

MANUAL DETECTION RATES

A piece of malware is not yet recognised by the technologies used? No problem! In each security feature, you can define unwanted objects that should be treated as malware. You can thus create a preventive protection or immediately act in an emergency.

Try for free
United Endpoint Protector - Blacklist
United Endpoint Protector - Dashboard
STATUS REPORTS

STATUS REPORTS

YOUR SECURITY AT A GLANCE

Regardless of how many vendors you currently use, in which features. All information flows together into an integrated status-reporting. You can evaluate your security status at a glance and receive all the information to optimise your configuration.

Try for free

Test the United Endpoint Protector

now for free!

Register Now
United Endpoint Protector In Use

UNITED ENDPOINT
PROTECTOR

MULTI-ENGINE ENDPOINT PROTECTION

The United Endpoint Protector is the first universal antivirus solution for your Windows clients and server. Equipped with multiple technologies cores, it offers you – on-premise – a wide range of antimalware vendors, which are available to you by click. Decide yourself which ones you want to use, combine all technologies at will and adjust your selection to each of your application areas.

Try for free

ACTIVATE

SECURITY
TECHNOLOGIES
INSTEAD OF
INSTALLING

HOW IT WORKS

How It Works 1

INSTALL

Install the United Endpoint Protector

Arrow
How It Works 2

UNLOCK

Unlock vendors at any time with license keys

Arrow
How It Works 3

ACTIVATE

Activate the technologies in desired features

The United Endpoint Protector offers you new possibilities for technology usage. For the first time, you can flexibly determine the anti-malware technologies according to each security feature, each endpoint and each application area. Decide yourself whether to use a single vendor or if you would like to design your security redundantly with several technologies. The combination possibilities are unlimited. Your decisions do not have to be made for eternity, either. With only a few mouse clicks, you can rearrange the security vendors, switch off currently running ones or bring new ones into effect. For this, install the United Endpoint Protector on your Windows endpoint, instead of a traditional virus scanner. Then you can decide at any time which vendors you would like to use. You can unlock them, without a new software roll-out, simply with our technology licences. The technologies available with this can then be activated and combined with others in the various security features. You will also be supported in this by the United Control Center, to implement your decisions across the network.

SUPPORTED PLATFORMS

  • Windows 7 (64bit)
  • Windows 8 (64bit)
  • Windows 10 (64bit)
  • Windows 2008 R2
  • Windows 2012 R2
  • Windows 2016

LAYERED

DEFENSE

Security Incident Handling

Malware has developed into complex software over the course of time. Modern variants no longer consist of a single file, instead they perform complex actions. As well as the creation of malicious files, malicious processes are started, and legitimate ones are attacked. Erroneous entries in the Windows Registry are created and existing ones are manipulated. Each of these behaviours is often well camouflaged, not recognisable with the naked eye and quickly has catastrophic consequences.

A smart attacker requires a smart opponent, the United Endpoint Protector! Its security features cover all the different paths along which malware can move on a device. On each of these levels, you can strategically place the various anti-malware technologies to detect and fight all malicious activities.

Try for free

FILE SECURITY

REAL-TIME MONITORING OF ALL FILE OPERATIONS

File Security

Malicious files are the number one malware incident factor, andcan arrive on your endpoint in a variety of ways. With File Security, you can monitor every file access on your hard drives in real time and automatically check them with multiple vendors. You can thus fight all file-based actions of a malware and prevent an infection, usually right in the beginning stage.

Read more…
Try for free

MEMORY SECURITY

FORENSIC INSPECTION OF THE MEMORY

United Endpoint Protector - Process Security

Memory is used by malware to execute malicious codes on your endpoint. You should, therefore, have it regularly checked by Memory Security. With up to 8 forensic methods, it covers every code execution, which you can immediately have evaluated by multiple vendors. This eliminates actively-executed malware from the memory and provides detailed feedback about all processes.

Rekall Forensics
Read more…
Try for free

REGISTRY SECURITY

REAL-TIME MONITORING OF THE WINDOWS REGISTRY

United Endpoint Protector - Registry Security

The Windows Registry is a favourite attack target for malware to create auto-start entries, storing their own data and modifying existing entries. Monitor all manipulation attempts with the Registry Security, even before they are made. You can have all changes checked for harmful signs, in real time, and thus prevent malware from implanting.

Read more…
Try for free

ON-DEMAND SCAN

ACTIVE CHECKING OF ALL AREAS OF THE COMPUTER

United Endpoint Protector - OnDemand

Actively hunt for malware, with multiple vendors. Comb through all the areas of your endpoint, for undiscovered or inactive threats. The CPU load for this can amount to less than 5 %, to avoid disturbing the user.

The Sleuth Kit - Digital Forensics
Try for free

MULTIPLE CLOUDS

LIVE INFORMATION AND ARTIFICIAL INTELLIGENCE

Clouds

Immediately receive the latest information about known malware and zero-day attacks, as well as access to artificial intelligence from the research centres of the vendors. In each security feature, you can enable various clouds for this purpose. These information sources are then automatically included in the fight against malware. Your detection rates are thus always up to the latest state of knowledge.

Read more…
Try for free

MULTIPLE CLEANING

ENTIRE REMOVAL OF MALWARE

United Endpoint Protector - Actions

Not just detecting, but also the clean-up of malware can be performed with joint forces. You can thus ensure that the threat is not just partially removed. To avoid false alarms in this process, you can set the actions to be executed according to the number of vendors that have recognised a threat.

Read more…
Try for free

BLACKLIST

MANUAL DETECTION RATES

United Endpoint Protector - Blacklist

A piece of malware is not yet recognised by the technologies used? No problem! In each security feature, you can define unwanted objects that should be treated as malware. You can thus create a preventive protection or immediately act in an emergency.

Try for free

STATUS REPORTS

YOUR SECURITY AT A GLANCE

United Endpoint Protector - Dashboard

Regardless of how many vendors you currently use, in which features. All information flows together into an integrated status-reporting. You can evaluate your security status at a glance and receive all the information to optimise your configuration.

Try for free

Test the United Endpoint Protector

now for free!

Register Now