Endpoint Security

Endpoint Security - Advanced

A multi-layered security with extended control tools

Endpoint Security - Advanced combines multi-layered security with extended control tools to deliver an agile security solution that rapidly adapts to protect against new threats. The security and systems management console saves valuable time and resources, while extra defensive layers help eliminate vulnerabilities and further safeguard sensitive data.

Endpoint Security

Advanced protection, control and security systems management

Intelligent security for endpoints and servers

Security - Advanced is designed to secure any IT environment. A full stack of proven and innovative technologies, including Adaptive Anomaly Control, encryption and automated patch management, addresses even advanced and unknown threats, reducing your risk and keeping your organization, your data and your users safe.Systems management tools save time and money, while seamless integration with new EDR Optimum and Sandbox makes it easy to add powerful automated detection and response capabilities to this security armory.

One management console

From the 'single pane of glass' management console, administrators can view and manage the entire security landscape and apply your chosen security policies to every endpoint in your business. This helps deploy security rapidly and with minimum interruption or fuss, using the wide range of preconfigured scenarios.

Most tested, most awarded

Year after year our products top the charts in independent tests and reports. We're proud of this remarkable track-record and all the industry recognition that goes with it. And we're even more proud that our customers feel the same way, consistently expressing outstanding levels of satisfaction with our products and our performance.

CMAYA Benefits
The protection and management capabilities you need

has built powerful enterpriseclass features into the progressive tiers of our products. We’ve made sure that the technology is uncomplicated and flexible enough for any growing business to use..

Multiple protection layers for

  • Windows, Linux and Mac
  • Windows and Linux servers
  • Windows Server containers
  • Android and other mobile devices
  • Removable storage

Unparalleled defense against

  • Software exploits
  • Ransomware
  • Mobile malware
  • Advanced threats
  • Fileless threats
  • PowerShell & script-based attacks
  • Web threats

Features Included

  • Anti-Malware
  • Vulnerability Management
  • Security Policy Adviser
  • Exploit Prevention and Rollback
  • Firewall and OS firewall management
  • Cloud-assisted protection
  • Full integration with EDR Optimum NEW
  • Full integration with Sandbox NEW
  • Adaptive Anomaly Control
  • Application, Web and Device
  • Controls
  • Server and containers protection
  • Remote Data Wipe NEW
  • Mobile Threat Defense
  • OS encryption management
  • System configuration & deployment
  • Patch Management
  • Reporting
  • Web and MMC based consoles

Key features

  • Multi-layered intelligent protection
    File, Web and Mail Threat Protection, Firewall, Network Threat Protection, BadUSB Attack Prevention and AMSI Protection Provider deliver essential protection, while advanced protection components, including HIPS, Security Network, MLpowered Behavior Detection (with Automatic Roll-Back), Anti-Ransomware Protection and Exploit Prevention, can detect and repel even new and unknown threats. Host Intrusion Prevention and centralized web, device, application and anomaly controls reduce your attack surface and help keep users safe and productive.
  • Windows, Mac, Linux – all covered
    Protection for Windows and Linux endpoints and servers, and for Mac for workstations, are all administered from the same console – ideal for mixed environments.
  • Mobile management and protection
    Powerful anti-malware combined with cloud-assisted threat intelligence, web control and anti-phishing, mobile device management capabilities and integration with EMM systems.
  • Encryption and data protection
    FIPS 140.2 and Common Criteria-certified encryption can be centrally enforced at file, disk or device-level, with native encryption tools such as Microsoft BitLocker and macOS FileVault.
  • System, vulnerability and patch management
    Streamlining and centralizing admin tasks to save time and money, as well as further heightening your security, with:
    • Advanced in-depth scanning for vulnerabilities, and automated patch distribution
    • Time and resource-saving OS and software deployment
    • Centralized system image creation, storage and deployment - ideal for upgrade to Microsoft Windows 10
    • Hardware and software inventory reports - helping control software license obligations.
  • Flexible 360° management
    Security Center, our central management console, makes it easier for administrators to configure, deploy, update and manage their security. It simplifies the application of group tasks, policies and policy profiles and the generation of reports.
  • Integration for advanced prevention, detection and response
    Endpoint Security for Windows is designed to integrate with Sandbox and EDR Optimum for advanced automated detection and response.
  • Experience it for yourself
    Why not experience adaptive protection against advanced threats targeting your business for yourself?
About Adaptive Anomaly Control

This technology automatically helps apply the highest acceptable level of security for each role in the organization. After first monitoring specific actions and collecting information about the behavior of users and applications, it identifies and learns distinctive patterns of behavior, right down to individual user level. If an application then displays abnormal behavior against this pattern, the application is blocked. All without end-users being interrupted.

About EDR Optimum New
(sold separately)

The EDR capabilities already built into Endpoint Security can be further boosted with new EDR Optimum. The result is full visibility and the ability to apply root-cause analysis for a complete understanding of the status of your corporate defenses against advanced threats. Your IT security specialist is provided with the information and insights needed for effective investigation and a fast, accurate response to incidents before any damage can occur – as well as basic threat hunting capabilities (IoC scanning).

About Sandbox New
(sold separately)

Sandbox automatically protects against advanced threats designed to bypass endpoint protection. Based on dynamic threat emulation technology, Sandbox uses our best practices in combating complex threats and APT-level attacks, ensuring an automated response across all endpoints.

18/07/2022 10:05 AM


10:00 AM

Our BOT is coming soon!

10:00 PM