Endpoint Security

Endpoint Security is an approach to protecting corporate networks from remotely-attached devices (laptops, tablets, mobile phones and other wireless devices), as well as the devices themselves from external threats, by ensuring that the devices comply with the organisation’s policies and standards. Typically consisting of a VPN client, client OS and a centralised endpoint manager, centralised control can be on-premise or hosted in the Cloud as a SaaS service.

  • Symantec – Endpoint Security

    by Symantec

    The Symantec portfolio represents the cyber security industry’s only end-to-end solution set. Solutions include secure web gateways with filtering and malware analysis, AV and malware protection, proxy caching devices, email security, SSL visibility, DLP, sandboxing, CASB and security analytics.

    Every endpoint is a launch pad for a cyber attack on the corporate network. Symantec’s multilayered protection provides everything from file reputation and behavioral analysis to advanced machine learning and artificial intelligence. See and manage all endpoints from a single high-performance agent and management console for Windows, Mac, Linux, virtual machines, and embedded systems, both on-premises and in the cloud.

  • Pulse Secure – Endpoint Security

    by Pulse Secure

    Pulse Secure is a leading provider of secure access solutions to both enterprises and service providers. Enterprises from every vertical and of all sizes utilise the company’s virtual private network (VPN), network access control (NAC) and mobile security products to enable end-user mobility securely and seamlessly in their organisations.

    Pulse Policy Secure is Pulse Secure’s endpoint security offering, employing TNC-compliant host integrity checking, anti-malware checking and patch management over a secure VPN to effect protection of the network and the hosts.

  • LogRhythm – Endpoint Security

    by LogRhythm

    LogRhythm provide a fully-integrated, enterprise-class security analytics, log management, log analysis and event management solution that empowers organisations to comply with regulations, secure networks and optimise IT operations. By automating the collection, organisation, analysis, archival and recovery of all log data, LogRhythm enables enterprises to comply with log data retention regulations while gaining valuable insights into security, availability, performance and audit issues within their infrastructure.

    Traditional endpoint protection is no longer up to task. What is needed is a second line of defense. Combining real-time endpoint monitoring with big-data analytics can detect advanced attacks and insider threats. This visibility also provides incident responders access to rich forensic data that can expedite investigations. LogRythm’s System Monitor provides this visibility.

  • IP-Performance recently ran 2 virtual cyber breach response workshops for Elmbridge Borough Council and we cannot recommend them highly enough. As well as lots of practical resources & templates to take away, the second day culminates with an simulation which brings a cyberattack to life. It’s highly interactive, slightly stressful, but most importantly really makes you think! There’s a definite buzz around cyber at Elmbridge now thanks to Phil and team.

    Nikki Benge, ICT Business Manager,
    Elmbridge Borough Council