https://store-images.s-microsoft.com/image/apps.47453.77065b23-cff3-4891-9406-7329e56a25cc.d8a308c7-aa47-4fe8-9b32-2e1e9fcbe24d.55c7798d-54f1-4240-91a9-e2ec53b91f65

eScan Enterprise Endpoint Detection & Response (EDR)

Microworld Technologies, Inc.

eScan Enterprise Endpoint Detection & Response (EDR)

Microworld Technologies, Inc.

eScan EDR: Layered endpoint protection with real-time visibility and remediation for endpoints.

eScan Endpoint Detection and Response (EDR) is a comprehensive, integrated, and layered endpoint protection solution that delivers real-time visibility, analysis, protection, and remediation for endpoints.
This helps to gain deep insights and alerts admin about the malicious activity that allows fast investigation, and restricts the attacks on endpoints as soon as detected.
It supports automated and manual actions to restrict the potential threats on the endpoint. It proactively reduces the attack, prevents malware infection, detects and defuses potential threats in real-time.

Key Feature

EDR Dashboard
eScan provides the summarized dashboard of the incidents that allows admins to gain deeper insights and taken quicker actions as and when detected.
It gives overview of incidents such as eScan, Windows, Endpoints, and Network in graphical as well as in detailed form.

Event Collector (Security Events) and Co-relation
All Windows security events (unauthorized login attempts, RDP connections, and Policy changes) are monitored for behavioral changes, policy violations, and exceeding granted rights.
These events are then forwarded to the server with secure protocols for threat analysis and storage. Besides, all the OS and app logs are collected which also improves real-time visibility, network safety, and time management.

EDR Violation events from Advanced Ransomware
eScan EDR gather the log & events from endpoints protecting and blocking of executable (.exe, .dll, or .src) and script (.ps, .vbs, .js) files that auto-run quickly after opening an email.
eScan EDR uses its heuristic PBAE technologies to monitor and block all the apps that are suspected as ransomware through their activity or behavior. Along with this, it also terminates the network session, if any infected system tries to gain access of protected system.

Threat Analysis
All event logs are stored at a secured server and analyzed further for threats-based on the malware type and corruption. They are checked against rule-based policies and regulations, then identified and categorized for security threat nature and level.

Data Leak Prevention (DLP) - Attachment Control
With the additional capabilities like Attachment Control and Device Control, eScan protects organizations from the risk associated with unauthorized transfer of sensitive content. Attachment Control allows to control the users' attempt in the distribution of sensitive information via specific processes as well as trusted websites that you define. It is a pay and use feature

Active Directory Synchronization
Administrators can synchronize eScan Centralized Console groups with Active Directory containers. All the new computers and containers found in Active Directory are automatically copied into eScan Centralized Console and the system admin will be notified.

Remote Monitoring Management
Remote monitoring and management (RMM) is a type of remote IT management software used by Managed IT Service Providers (MSPs) allow admins to remotely track issues and monitor IT assets. It helps organizations to gain insights into performance, health, and status of their endpoints. It is a pay and use feature.

Enhanced Two-way Firewall
eScan Two-way Firewall filters all the incoming and outgoing network requests, which enables you to monitor every inbound and outbound connection that is being established. This locks out hackers from connecting to the system and defends the connection of undesired apps to the internet. It provides the facility to define the firewall settings as well as define the IP range, permitted applications, trusted MAC addresses and local IP addresses.

Other Highlights
State-of-the-art Anti-Malware with signature & ?behavior based protection
Forensic Report
Unified Console for Windows, Mac, Linux, iOS ?and Android
Sophisticated File Blocking and Folder Protection
License Management
Outbreak Prevention
Roaming Client

Languages Supported:
English, German,French, Nederlands, Italian, Portuguese, Spanish, Turkish, Chinese Simplified,Chinese Traditional, Greek, Korean, Norwegian, Russian,Polish, Latin Spanish, Czech, and Slovak.
https://store-images.s-microsoft.com/image/apps.24879.77065b23-cff3-4891-9406-7329e56a25cc.d8a308c7-aa47-4fe8-9b32-2e1e9fcbe24d.650dc24a-31cf-4895-a37a-8ed801d30e12
https://store-images.s-microsoft.com/image/apps.24879.77065b23-cff3-4891-9406-7329e56a25cc.d8a308c7-aa47-4fe8-9b32-2e1e9fcbe24d.650dc24a-31cf-4895-a37a-8ed801d30e12
https://store-images.s-microsoft.com/image/apps.65421.77065b23-cff3-4891-9406-7329e56a25cc.d8a308c7-aa47-4fe8-9b32-2e1e9fcbe24d.90c47d49-4d72-43d0-9cde-b1ac826c7580
https://store-images.s-microsoft.com/image/apps.10593.77065b23-cff3-4891-9406-7329e56a25cc.d8a308c7-aa47-4fe8-9b32-2e1e9fcbe24d.791410d9-8a0b-4f4f-b5af-5c910ce86fa6
https://store-images.s-microsoft.com/image/apps.28152.77065b23-cff3-4891-9406-7329e56a25cc.d8a308c7-aa47-4fe8-9b32-2e1e9fcbe24d.a864362a-cd81-4eb1-b126-85e87d4622aa