|Run the separate Cleaner Monitor tool remotely and repair workstations infected with advanced or non-conventional malware.
||With Endpoint Protection you can carefully monitor the security of your corporate network.
Automatically generate easy to interpret reports and graphs or consult all of this data in real time thorough comprehensive dashboards.
||Assign different protection policies to users through configuration profiles.
Apply different levels of protection according to the profile of the user that connects to your corporate network.
|Avoid malware entry and data leaks by blocking device categories: USB memory sticks and modems, webcams, DVD/CD drives, etc.
In addition, you can establish exceptions with device whitelists, or simply block certain dangerous actions (access, read, write) on protected computers.
||Deploying the antivirus across complex networks has never been easier.
You can use two methods to install the antivirus on all the endpoints on your network: via an email with a download URL or transparently with the Endpoint Protection deployment tool (compatible with Active Directory, Tivoli, SMS etc.).
||With Malware Freezer you can avoid any false positives. Freeze the malware detected for seven days and if it is a false alarm, automatically restore the file on the user’s system.