資安常用軟體‎ > ‎加密解密‎ > ‎

PGP Endpoint Application Control

張貼者:2010年6月12日 上午10:57service orderble   [ eddie liu 已於 2012年8月7日 下午11:19 更新 ]

概觀

這是一場戰爭,針對保護您的網絡,不受到惡意的攻擊,是可以克服的。

PGP® Endpoint Application Control提供精確的,且基於策略的執行應用程序的管理針對需要管理的安全端點,包含從數據洩漏,惡意軟件,間諜軟件,鍵盤記錄程序,木馬,後門,蠕蟲和病毒,零日威脅(zero-day threats)和不想要的或未經授權的軟件。 PGP終點應用控制,讓管理員可以集中管理,監控和控制應用程序,以清單的方式(whitelist approach ),只允許授權的應用程序運行,確保不會有多餘的或未經授權的軟件在企業網絡上執行和破壞生意。

  • 降低數據被破壞的風險 --確保了公司敏感數據資料,不會被未經授權程序以及惡意軟體竊取。
  • 主動且自動化保護-- 減少服務單位和行政負擔。 提供自動化以及0day 的保護,針對已知或者未知的應用程式威脅。
  • 支持協議,詳細的審計應用程序的執行協助證明的規定。(Supports Compliance –Detailed audits of application execution assist in demonstrating compliance.)
  • 業務連續性,防止業務中斷所造成的惡意軟件的擴散應用。
  • 透明的用戶體驗,自動和後台操作,確保用戶的工作效率不受影響。
---------------------------------------------------

開發商:PGP
原廠網址:http://www.pgp.com/products/endpoint_application_control/index.html
更新日期:2011/05/09
採購正式版、大量授權報價、技術支援、軟體諮詢、委託採購、詢問報價請來電 02-29299388 分機16 , 
來信service@orderble.com,或點我
------------------------------------------------------------------------------


Overview

The battle to protect your network from malware can seem insurmountable.

PGP® Endpoint Application Control provides granular, policy-based enforcement of application use to proactively secure endpoints from data leakage, malware, spyware, keyloggers, Trojans, rootkits, worms and viruses, zero-day threats and unwanted or unlicensed software. With PGP Endpoint Application Control, administrators can centrally manage, monitor, and control applications with a whitelist approach that allows only authorized applications to run, ensuring no unwanted or unlicensed software will execute on the corporate network and disrupt business.

  • Reduces the risk of a data breach –Ensures sensitive corporate data is not compromised by unauthorized and malicious software.
  • Proactive and automatic protection - Reduces helpdesk and administrative burdens. Provides automatic, zero-day protection from known and unknown application threats.
  • Supports Compliance–Detailed audits of application execution assist in demonstrating compliance.
  • Business continuity–Prevents business downtime caused by proliferation of malicious software applications.
  • Transparent user experience–Automatic and background operation ensures user productivity is unaffected.

Comments