https://store-images.s-microsoft.com/image/apps.47453.77065b23-cff3-4891-9406-7329e56a25cc.d8a308c7-aa47-4fe8-9b32-2e1e9fcbe24d.55c7798d-54f1-4240-91a9-e2ec53b91f65
eScan Enterprise Endpoint Detection & Response (EDR)
Microworld Technologies, Inc.
eScan Enterprise Endpoint Detection & Response (EDR)
Microworld Technologies, Inc.
eScan Enterprise Endpoint Detection & Response (EDR)
Microworld Technologies, Inc.
eScan EDR: Layered endpoint protection with real-time visibility and remediation for endpoints.
eScan Endpoint Detection and Response (EDR) is a comprehensive, integrated, and
layered endpoint protection solution that delivers real-time visibility, analysis,
protection, and remediation for endpoints.
This helps to gain deep insights and alerts
admin about the malicious activity that allows fast investigation, and restricts the
attacks on endpoints as soon as detected.
It supports automated and manual actions to
restrict the potential threats on the endpoint. It proactively reduces the attack,
prevents malware infection, detects and defuses potential threats in real-time.
Key Feature
EDR Dashboard
eScan provides the summarized dashboard of the
incidents that allows admins to gain deeper
insights and taken quicker actions as and when
detected.
It gives overview of incidents such as
eScan, Windows, Endpoints, and Network in
graphical as well as in detailed form.
Event Collector (Security Events)
and Co-relation
All Windows security events (unauthorized login
attempts, RDP connections, and Policy changes)
are monitored for behavioral changes, policy
violations, and exceeding granted rights.
These
events are then forwarded to the server with
secure protocols for threat analysis and storage.
Besides, all the OS and app logs are collected which
also improves real-time visibility, network safety,
and time management.
EDR Violation events from
Advanced Ransomware
eScan EDR gather the log & events from endpoints
protecting and blocking of executable (.exe, .dll, or
.src) and script (.ps, .vbs, .js) files that auto-run
quickly after opening an email.
eScan EDR uses its
heuristic PBAE technologies to monitor and block
all the apps that are suspected as ransomware
through their activity or behavior. Along with this,
it also terminates the network session, if any
infected system tries to gain access of protected
system.
Threat Analysis
All event logs are stored at a secured server and
analyzed further for threats-based on the malware
type and corruption. They are checked against
rule-based policies and regulations, then identified
and categorized for security threat nature and
level.
Data Leak Prevention (DLP) -
Attachment Control
With the additional capabilities like Attachment
Control and Device Control, eScan protects
organizations from the risk associated with
unauthorized transfer of sensitive content.
Attachment Control allows to control the users'
attempt in the distribution of sensitive
information via specific processes as well as
trusted websites that you define. It is a pay and use
feature
Active Directory Synchronization
Administrators can synchronize eScan Centralized
Console groups with Active Directory containers.
All the new computers and containers found in
Active Directory are automatically copied into
eScan Centralized Console and the system admin
will be notified.
Remote Monitoring Management
Remote monitoring and management (RMM) is a
type of remote IT management software used by
Managed IT Service Providers (MSPs) allow admins
to remotely track issues and monitor IT assets. It
helps organizations to gain insights into
performance, health, and status of their endpoints.
It is a pay and use feature.
Enhanced Two-way Firewall
eScan Two-way Firewall filters all the incoming and
outgoing network requests, which enables you to
monitor every inbound and outbound connection
that is being established. This locks out hackers
from connecting to the system and defends the
connection of undesired apps to the internet. It
provides the facility to define the firewall settings
as well as define the IP range, permitted
applications, trusted MAC addresses and local IP
addresses.
Other Highlights
State-of-the-art Anti-Malware with signature & ?behavior based protection
Forensic Report
Unified Console for Windows, Mac, Linux, iOS ?and Android
Sophisticated File Blocking and Folder Protection
License Management
Outbreak Prevention
Roaming Client
Forensic Report
Unified Console for Windows, Mac, Linux, iOS ?and Android
Sophisticated File Blocking and Folder Protection
License Management
Outbreak Prevention
Roaming Client
Languages Supported:
English, German,French, Nederlands, Italian, Portuguese, Spanish, Turkish, Chinese Simplified,Chinese Traditional, Greek, Korean, Norwegian, Russian,Polish, Latin Spanish, Czech, and Slovak.https://store-images.s-microsoft.com/image/apps.24879.77065b23-cff3-4891-9406-7329e56a25cc.d8a308c7-aa47-4fe8-9b32-2e1e9fcbe24d.650dc24a-31cf-4895-a37a-8ed801d30e12
https://store-images.s-microsoft.com/image/apps.24879.77065b23-cff3-4891-9406-7329e56a25cc.d8a308c7-aa47-4fe8-9b32-2e1e9fcbe24d.650dc24a-31cf-4895-a37a-8ed801d30e12
https://store-images.s-microsoft.com/image/apps.65421.77065b23-cff3-4891-9406-7329e56a25cc.d8a308c7-aa47-4fe8-9b32-2e1e9fcbe24d.90c47d49-4d72-43d0-9cde-b1ac826c7580
https://store-images.s-microsoft.com/image/apps.10593.77065b23-cff3-4891-9406-7329e56a25cc.d8a308c7-aa47-4fe8-9b32-2e1e9fcbe24d.791410d9-8a0b-4f4f-b5af-5c910ce86fa6
https://store-images.s-microsoft.com/image/apps.28152.77065b23-cff3-4891-9406-7329e56a25cc.d8a308c7-aa47-4fe8-9b32-2e1e9fcbe24d.a864362a-cd81-4eb1-b126-85e87d4622aa