![]() ![]() Neighborcast: The introduction of F-Secure Endpoint Proxy and the reduction of overall bandwith usagereduces the need for complex solution such as neighborcast.Email and Spam scanning: This is removed due to the generalization of end to end encryption for email and of widespread use of cloud emails.Support for Windows Vista: They account for less than 0,2% of our installed base.Following a confirmed detection, our solution provides advice and recommendations to guide you through the necessary steps to contain and remediate the threat.F-Secure Partner or your own IT team manages the alerts, and there's an option to elevate tough investigations to F-Secure. Visualised broad context and descriptive attack information make confirming a detection easy.F-Secure's real-time behavioural analytics and Broad Context Detection™ distinguish malicious behaviour patterns and identify real attacks.Lightweight sensors monitor your endpoint users' behaviour and stream the events to F-Secure cloud in real-time.RDR is an automatic advanced threat identification, that allows an IT team or managed service provider can detect and stop targeted attacks quickly and efficiently. RDR can simply be activated by upgrading the subscription or remotely changing the subscription key without any action required on the client. DataGuard: Protecting specific folder to block for example ransomware from modifying them.Monitoring mode to evaluate rules before enforcing them. ![]() Configurable rules to block or allow applications and scripts.Default security rules to block the most common threats providing yet another layer of defense.Application Control: Providing fine grain rules to control the applications running on a computer.The Premium offer can simply be activated by upgrading the subscription or remotely changing the key without any action required on the client. RMM Support (Remote Management and Monitoring) as described in the article: Computer Protection integration with RMM software.The administrator should then provide the reference number (available from the device operations tab, or the view fsdiag operation in support page) to F-Secure in a support ticket. Remote diagnostic file (fsdiag): In case of problem with a computer, the PSB administrator can select the computer and request a diagnostic file to be uploaded to F-Secure.A new category for Active Directory is also available Active Directory information: Active Directory name, Organizational unit, Domain Components and GUID are visible.Īctive Directory (AD) filtering: By searching an AD domain in the device list view, only the computers using this domain are displayed.Scan report in portal: If an admin suspect an issue with a Windows computer, he will be able to check the latest scan report (it might be a scan triggered from portal, or scheduled or manual) remotely.Improved visibility in device details view:.F-Secure Endpoint Proxy: It reduces the bandwith usage by caching malware database updates.Provide visibility to the USB devices of a computer.To restrict the usage of USB devices, such as a memory stick or web cam.That replaces the ability to change the key from the client. The computer automatically take into use the new product associated with the key (e.g. Remote change of subscription key (without client re-installation) from PSB portal.For example, the premium features and Rapid Detection and Response (RDR) can easily be activated. Extensible client architecture, allowing easier integration of new features.Many performance and stability improvements.Uninstallation can be protected by a password configured in PSB Portal.MSI package available (see the article Remote Installation of Computer Protection article).Completely revised update technology, bringing significant reduction in network bandwidth usage.Silent Computer Protection upgrades without the need to reboot the computer allowing regular updates of the client.Our security experts updated the default Firewall profiles to handle the most significant threats.Unifies behavior of security components and brings the possibility to add new security features more easily in the future.Significantly revised scanning architecture using the latest technology from the F-Secure Lab, including native support for 64-bit technology.This product is replacing Workstation Security 12 clients that will be End of Life on 31 st of March, 2019.į-Secure Computer Protection has been in production for a year.į-Secure has now introduced a migration tool that allows the Solution Provider to migrate easily to Computer Protection clients.īoth security clients can be used with the same license key, no change in subscription is required. Protection Service for Business’s latest generation of endpoint security client is F-Secure Computer Protection. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |