Endpoint Security

Endpoint Security is an approach to protecting corporate networks from remotely-attached devices (laptops, tablets, mobile phones and other wireless devices), as well as the devices themselves from external threats, by ensuring that the devices comply with the organisation’s policies and standards. Typically consisting of a VPN client, client OS and a centralised endpoint manager, centralised control can be on-premise or hosted in the Cloud as a SaaS service.

  • Symantec – Endpoint Security

    by Symantec

    The Symantec portfolio represents the cyber security industry’s only end-to-end solution set. Solutions include secure web gateways with filtering and malware analysis, AV and malware protection, proxy caching devices, email security, SSL visibility, DLP, sandboxing, CASB and security analytics.

    Every endpoint is a launch pad for a cyber attack on the corporate network. Symantec’s multilayered protection provides everything from file reputation and behavioral analysis to advanced machine learning and artificial intelligence. See and manage all endpoints from a single high-performance agent and management console for Windows, Mac, Linux, virtual machines, and embedded systems, both on-premises and in the cloud.

  • Pulse Secure – Endpoint Security

    by Pulse Secure

    Pulse Secure is a leading provider of secure access solutions to both enterprises and service providers. Enterprises from every vertical and of all sizes utilise the company’s virtual private network (VPN), network access control (NAC) and mobile security products to enable end-user mobility securely and seamlessly in their organisations.

    Pulse Policy Secure is Pulse Secure’s endpoint security offering, employing TNC-compliant host integrity checking, anti-malware checking and patch management over a secure VPN to effect protection of the network and the hosts.

  • LogRhythm – Endpoint Security

    by Private: LogRhythm

    LogRhythm provide a fully-integrated, enterprise-class security analytics, log management, log analysis and event management solution that empowers organisations to comply with regulations, secure networks and optimise IT operations. By automating the collection, organisation, analysis, archival and recovery of all log data, LogRhythm enables enterprises to comply with log data retention regulations while gaining valuable insights into security, availability, performance and audit issues within their infrastructure.

    Traditional endpoint protection is no longer up to task. What is needed is a second line of defense. Combining real-time endpoint monitoring with big-data analytics can detect advanced attacks and insider threats. This visibility also provides incident responders access to rich forensic data that can expedite investigations. LogRythm’s System Monitor provides this visibility.

  • “IP Performance have worked as a trusted networking and cyber security partner with SCCB for many years. I highly recommend IP Performance. The team are highly responsive and extremely knowledgeable. Their networking and security solutions provided to us are well designed to meet our specific needs and the pricing is always very competitive. I have full trust in IP Performance to help us keep our IT systems at SCCB resilient, efficient, and secure.”

    Dave Birks, IT Services,
    South and City College Birmingham