Endpoint Protection - List of Manufacturers, Suppliers, Companies and Products

Endpoint Protection Product List

1~2 item / All 2 items

Displayed results

Comprehensive Endpoint Protection "Exosphere"

We protect the business from various threats inside and outside the company by layering multiple types of protection.

"Exosphere" is a comprehensive endpoint protection solution that provides simple all-in-one measures against all threats. We offer anti-malware, anti-ransomware, web protection, and data loss prevention features necessary for endpoint security environment protection through a single agent and management system. This reduces the costs associated with implementing multiple security solutions and provides comprehensive solutions even for small businesses. 【Features】  ■Easy to implement  ■Simple to operate  ■Stable detection performance  ■Multi-functional  ■Cost reduction  ■Fully cloud-managed *For more details, please download the PDF or contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Endpoint Protection "Bromium"

Completely protect confidential information with 'Internet separation' and 'Application separation'!

"Bromium" is an endpoint protection solution that utilizes CPU virtualization technology to ensure 100% safety for your PC, even when opening malware or infected files. By installing it on your PC, it automatically generates a "MicroVM," which is a completely independent virtual environment from the existing PC. Documents and programs sent via the internet or USB operate within the isolated MicroVM, so even if malware like Emotet sneaks in, it will not affect the existing PC or the internal network, keeping confidential information safe. 【Features】 ■ Strong security achieved through application isolation ■ Centralized management of threat information on a management server ■ Internet isolation (network separation) ■ Neutralization of received files from chat and email ■ Global information security, including overseas locations ■ Diverse service delivery formats *For more details, please refer to the PDF materials or feel free to contact us.

  • Security Assessment
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration