Endpoint Security features in Endpoint Central: Breaking the silos between endpoint management and security
The major challenge of growing organizations, these days, are the increasing number of endpoints. With the steep increase in the endpoints, traditional anti-virus, file scanning, and security solutions are no match to the security loopholes that these devices pose to the network. In a study conducted by CISO MAG, close to 37% of the respondents didn't use any kind of endpoint protection solutions or were just in the process of evaluating potential security solutions. The same study had around 33% say that their biggest challenge with endpoint security solutions, lay in its complexity of deploying, managing, and using.
Multiple dashboards, agents, and complex security processes would more often cause confusion than help secure the network. To avoid the hassle involved with multiple security solutions, Endpoint Central now comes with Endpoint Security features. Endpoint Central powered with the Endpoint Security features will handle the holistic security and management of all the managed endpoints in your network.
With this addition to Endpoint Central, you get the combined benefits of five aspects of endpoint security namely: vulnerability management, browser security, device control, application control, and BitLocker management.
This document will elaborate on the features of the Endpoint Security add-on. For other details, check out our FAQ page.
Endpoint Central's endpoint security features
1. Vulnerability management and Compliance
Regularly scan all your managed endpoints for known vulnerabilities, threats, and default/poor misconfigurations to seal the entry points of cyber attacks with our thorough vulnerability assessment and mitigation features
- Vulnerability assessment: Identify and assess real risks from a plethora of vulnerabilities spread across your network
- Security configuration management: Keep track of configuration drifts and deploy secure configurations to eliminate security loopholes.
- CIS compliance: Audit and maintain your systems in line with 75+ CIS benchmarks, instantly identify violations, and view detailed remediation insights.
- Zero-day-vulnerability mitigation: Identify and mitigate zero-day vulnerabilities with pre-built, tested scripts.
- Web server hardening: Detect and remediate expired SSL, inappropriate web root directory access and other web server flaws.
- High-risk software audit: Analyse and uninstall software that are unsafe, unauthorized and unsupported by the vendor.
- Anti-virus audit: Get information on systems in which antivirus is absent, inactive, and not-up-to-date.
- Port audit: Monitor the ports in use and processes running in it, and identify unintended ports that may be activated by malware or unknown applications.
2. Browser security
Browsers are probably the most neglected endpoints and the most common entry points for malware. Monitor and enforce security measures on the browsers used in your organization with our inclusive set of features for browser security.
- Add-on control & management: Exercise control over installation and usage of browser extensions and plugins.
- Web filter: Control access to the internet by providing or denying access to specific sites.
- Download filter: Restrict file downloads from unauthorized websites and ensure secure browsing.
- Browser routing: Automatically direct legacy web-applications to legacy browsers when opened in modern browsers.
- Java Rules Manager: Assign specific Java versions to web-applications based on requirements.
- Browser customization: Manage bookmarks, set default browsers, configure policies to enhance browser security, and tailor browser settings to suit your Organizational requirements.
- Browser Lockdown: Enforce kiosk mode with IT approved websites and business web applications.
- Browser compliance: Discover computers' compliance status with security configurations and achieve 100% compliance.
3. Application control
Unauthorized applications posing a risk to your organization's security and productivity? Use our comprehensive set of features to control applications by blacklisting, whitelisting, or greylisting applications with ease.
- Application whitelisting: Create whitelists automatically by specifying your pre-requisites in the form of application control rules.
- Application blacklisting: Curb unproductivity and limit cyber attack risks by blocking non-business applications and malicious executables.
- Flexibility regulator: Regulate the level of flexibility preferred during the enforcement of application control policies.
- Endpoint privilege management: Prevent privilege elevation attacks by assigning need-based application specific privileged access.
4. Device control
Say goodbye to stray USBs in your network. Regulate, and restrict peripheral devices in your organization and closely monitor file transfer in and out of your network with our carefully curated features for device control.
- Device & port control: Control all ports and connected removable devices, block unauthorized access to your data and monitor all device & file actions effectively.
- File access control: Prevent data loss with strict role based access control policies - set read only permission, block copying of data from devices and do more.
- File transfer control: Curb unprecedented data transfers - limit file transfers by setting the maximum file size and type of file that can be transferred from your computer.
- Trusted device list: Create exclusive access for devices to access your computer by adding them to the trusted device list.
- Temporary access: Create secure and temporary access for devices to access your computers when they want to access what they want to access.
- File shadowing: Effectively secure files involved in data transfer operations by creating and storing mirror copies in password-protected shares.
- File tracing: Monitor file actions in real time, record salient details such as file names and locations along with the computers, devices and users involved.
5. BitLocker management
Enable data storage only in BitLocker encrypted devices in order to protect sensitive/corporate data from theft. Monitor BitLocker encryption and TPM status in all managed devices.
Secure your endpoints from ransomware attacks.
- Behavioral Detection : Machine learning-based behavior analysis to detect ransomware attacks accurately.
- Incident Response : Gain complete insights into the root cause of attacks while providing immediate incident response and also prevent similar future attacks.
- Recovery and Rollback : One-click rollback of infected files via patented recovery process with Microsoft VSS.
To know more about Anti-Ransomware Early Access program,click here!
7. Endpoint DLP
Protect your enterprise critical data from disclosure and theft by leveraging advanced data loss prevention strategies.
- Robust data classification: Categorize your sensitive data from the plethora of miscellaneous enterprise data.
- Complete cloud upload protection: Restrict private cloud storage uploads and confine uploads within the enterprise-approved cloud applications.
- Secure E-mail collaborations: Allow E-mail exchanges within trusted domains to ensure safe communication.
- Stringent peripheral device control: Block the transfer of sensitive data via unauthorized USB devices, also control the download and printing limit for allowed devices.
- Instant alerts and extensive audits: Comprehensive reports and instant alerts to track and stay up to date with your network performance.
Enabling the Endpoint Security add-on
Once you have downloaded Endpoint Central, open the console and navigate to Admin > Add-Ons > Endpoint Security Add on > Enable Now. Once enabled, you can find the add-on features displayed on the upper tab of the console.
For more details about the Endpoint Security add-on, check out some FAQs about the add-on and other features of endpoint security in Endpoint Central.