Server and Workstation Security
Not just an antivirus. Powered by SentinelOne®.
A complete solution to proactively protect your endpoints (servers, PCs, devices) from all known or unknown threats, from classic viruses and malware to ransomware and botnets.
Our solution protects, detects and responds in real time to all threats, thanks to the artificial intelligence of the SentinelOne® engine, the new generation of IT security.
€ + /
Antivirus, malware, ransomware, botnet protection
Detection based on behavioural AI
Control of incoming and outgoing network flow
USB device control
Bluetooth device control
Rogue device discovery
File integrity monitoringe
EDR data retention for 14 days
EPP: EndPoint Protection
The agent installed on the endpoint (PC, server, workstation) acts as a sentinel which, thanks to its AI (Artificial Intelligence) based engine, observes all the signals that characterise the behaviour of malicious software, preventing attacks from known or unknown threats in real time (0-day protection), unlike traditional antivirus.
EPP also allows control of all USB and Bluetooth devices, giving administrators the possibility of creating customized and detailed controls on USB devices (storage, read-write, read-only), while for Bluetooth devices, controls can cover both the protocol version and the type of device.
Finally, EPP provides control of incoming and outgoing network traffic for each endpoint (Windows, Linux, Mac) by defining customized free or blocked access rules.
EPP + EDR: EndPoint Protection + Endpoint Detect and Response
In addition to the features already described for the EPP component, EDR (Endpoint Detect and Response) detects and responds to all threats through a combination of NGAV (Next Generation AntiVirus) and behavioural artificial intelligence.
The service allows you to keep track of all the activities of the operating system, both normal and malicious, in order to:
- fully identify and analyse the causes and history of an attack;
- respond with specific actions to detected threats;
- immediately resolve system changes caused by the threat or attack;
- restore the state of the system and files to the time before the attack;
- provide forensic incident analysis and reporting.
All EDR activities can be performed automatically, without human intervention.
The EDR component therefore triggers continuous vigilance and retains data for at least 14 days.
(*) Storyline™: analyse attack causes and history; constantly monitors all processes of the operating system, malicious and benign, creating the process tree and mapping events.
|EPP + EDR
EPP + Endpoint Detect & Response
|USB device control|
|Bluetooth device control|
|Rogue device discovery|
|Secure remote shell|
|ActiveEDR® Visibility with Storyline™|
|MITRE ATT&CK® integration|
|File integrity monitoring|
|STAR (Storyline Active Response™) customized detection rules|
|EDR data retention for 14 days|