SOPHOS UTM ENDPOINT PROTECTION,ENDPOINT PROTECTION,SUBSCRIPTION RENEWAL,24 MONTHS,201-300
Uppskattad leveranstid: Obekräftad
|Programvara - typ||Förnyande|
|Licenstiden||24 månad (er)|
|Minimum hårddisk utrymme||20000 MB|
|Minimikrav, processor||Intel Dual-Core|
|Minimikrav, RAM||1024 MB|
|Kompatibla operativsystem||Windows XP SP2|
Windows Server 2003
Windows Server 2008
Windows Server 2012
|Rekommenderad processor||Intel Quad-Core 2GHz|
|Rekommenderad RAM||2048 MB|
|Rekommenderad hårddiskutrymme||40 GB|
UTM Endpoint Protection
Simplify security by managing endpoint antivirus from your UTM.
Our UTM Endpoint Protection is centrally managed alongside your network protection. Keep your Windows network safe with a single endpoint agent, including antivirus, web protection and device control. The agent prevents malware and data loss with no complicated network or directory prerequisites. And, you’ll get detailed reporting, giving you complete visibility and helping you clean up threats, fast.
- Network and endpoint protection in one;
- Automatic removal of existing antivirus on installation;
- Controls USB, Bluetooth and wireless devices;
- Intuitive browser-based interface;
- One vendor to call for support.
Certified malware protection that protects fast
Our quick scans don’t impact users while detecting and cleaning up viruses, spyware, rootkits, Trojans, adware and potentially unwanted applications (PUAs). We stop new threats fast using a built-in host intrusion prevention systems (HIPS), our web-based script attack detection and Live Anti-Virus real-time lookups to SophosLabs’ reputation database. And should an endpoint become infected, we inform your administrator by email to ensure a speedy clean-up.
Deployment made easy with flexible installation
Preconfigured installation packages detect and remove your existing antivirus and deploy our self-updating agent. Endpoints automatically register in the UTM. You can also deploy protection via USB stick, email, Active Directory GPO and standard software deployment tools. Tamper protection prevents unauthorized users and malware from uninstalling or disabling endpoint protection.
Reduces malware and data loss with built-in device control
You can find and block unauthorized uses of removable storage devices, optical media drives and wireless networking protocols like Wi-Fi, Bluetooth and infrared. Simply set your policy for different groups of computers—for example, allow encrypted USB keys for senior managers, and block use for everyone else.
Safe everywhere with Endpoint Web filtering
Web URL filtering is built-in. So, even when users are not browsing through a secure gateway, they’re protected from infected and inappropriate websites, just as if they were in the office. You can sync endpoint and gateway policies or create different rules for people out of the office. Block, allow or track access to over 90 content categories.
One console simplifies endpoint and network protection
You’ll get instant visibility of the security status for all Windows computers from the same console where you manage your network protection. You also have access to detailed logs of all events like denied access, and policy tampering. And it’s easy to keep track of activity with computer- and user-based reports that can be scheduled to run and automatically distributed.
Hovrättsesplanaden 18, 65100, Vasa
Alholmsgatan 3, 68600, Jakobstad
Gummeruksenkatu 6, 40100, Jyväskylä
Valtakatu 41, 53100, Villmanstrand
Lö: 10:00 - 16:00
Torggatan 12, 22100, Mariehamn
Suupohjantie 45, 60320, Seinäjoki
Lö: 10:00 - 15:00
Hovrättsesplanaden 19, 65100, Vasa
Alholmsgatan 5, 68600, Jakobstad