Endpoint Protection goes beyond antivirus to include firewall, IPS and advanced protection technologies in a single high-powered agent. Backed by the world’s largest civilian threat intelligence network, it blocks rapidly mutating malware and zero-day threats without impacting performance. Granular policy settings include system lockdown, application and device control for added security
Managing endpoint protection should be easy, provides multiple layers of protection through a single high-powered client and management console across both physical and virtual machines. We make it easy to deploy, update and manage your endpoint security across various locations, user groups, and operating systems.
A verification that an operating system and/or applications are configured appropriately to the companies needs and lockdown requirements, thus providing adequate and robust controls to ensure that the Confidentiality, Integrity and Availability of the system will not be affected in its normal day to day operation.
A verification that the intended system under development meets the configuration and lockdown standards requested by the customer.
A verification that the in-place IT management infrastructure encompassing all aspects of system support has been put in place. This is to ensure effective change control, audit, business continuity and security procedures etc. have been formulated, documented and put in place.