Faronics Anti-Executable

張貼者:2010年7月16日 上午2:33未知的使用者   [ eddie liu 已於 2011年5月24日 下午11:57 更新 ]
Faronics Anti-Executable從未經授權的可執行文件的絕對保護
Faronics反可執行保護工作站從不需要的軟件,防止未經授權的可執行文件運行或安裝。

Absolute Protection from Unauthorized Executables

Faronics Anti-Executable protects workstations from unwanted software by preventing unauthorized executables from running or installing.






---
開發商: Faronics Corporation
更新日期:2011/05/25
採購正式版、大量授權報價、技術支援、軟體諮詢、委託採購、詢問報價請來電 02-29299388 分機16 , 
來信service@orderble.com,或點我
-----------------------------------------------------------------------------




消除威脅
為用戶生產力
 

Faronics反可執行及其應用白名單技術,確保端點
安全和生產率只允許申請獲得批准,以在計算機上運行或
服務器。 任何其他方案 - 無論是不必要的,無牌,或者乾脆
不必要的,是永遠阻止執行。

應用白名單也遵守執行與組織資訊科技政策。 組織受益於生產每個環節和每一個用戶的時間,而科技人才是保證,台式電腦,筆記本電腦和服務器兼容可接受使用政策,法規要求,以及軟件部署的時間表。

在分層安全方法

隨著惡意軟件的數量和複雜的威脅不斷增加,單靠
定義為基礎的反惡意軟件解決方案,以確保資訊安全已不再是不夠的。
反可執行提供所需的額外一層保護現有
“黑名單”的解決方案,例如反病毒 - 的定義,而不需要更新。

安全性與靈活性的平衡

反可執行使應用 Windows和第三方更新容易和輕鬆。 按要求或定期維修模式允許應用程序更新和補充,具有自動白名單的人口。

訪問的 主要特點 為一個完整的頁面列出反可執行文件的功能和選項的兩個Windows版本: 標準 和企業 這些功能也適用於標準版和企業版的反可執行文件服務器。


 
 

企業 /政府

未經授權或惡意程序可能會導致大量的安全和正常運行時間的挑戰,企業的計算環境。 分心和惡意軟件可以被意外或故意從便攜式計算機上安裝驅動器,電子郵件帳戶,和網頁瀏覽。 允許這些程序運行在工作站上提出了嚴重挑戰 IT的努力,以確保系統運作,企業數據安全,以及員工的工作效率很高。

座分心軟件從運行

未經授權的應用,如遊戲和即時通訊客戶端,作為員工的生產力分心,造成公司系統將用於意想不到的用途。 對於 IT人員,未經授權的軟件,如點對點 P2P文件共享應用程序是一個消耗網絡帶寬,嚴重違反了可接受的使用政策,並威脅到公司的數據安全。 經修復的計算機系統速度變慢或正在經歷腐敗所造成的未經授權的軟件是一種浪費的IT資源和時間。 反可執行的白名單保護消除了所有這些問題和威脅,確保電腦工作站只能夠運行的應用程序被授權使用。 反可執行有助於確保網絡帶寬仍然有效,可接受的使用政策遵守執行,和IT人員擺脫了繁瑣的服務台和維修要求。

阻止惡意軟件從安裝

IT管理員總是在不斷的鬥爭,企圖將企業電腦和網絡的免費惡意軟件,如鍵盤記錄器,間諜軟件,惡意軟件,病毒和木馬。 這些有害件嚴重削弱軟件可以計算時段,隱私洩漏造成損害,妨礙員工生產力。 因此,政府立法,如HIPAA和Sarbanes - Oxley法案,公司必須作出認真努力,以增加安全性和完整性的數據。 反可執行保護用戶免受這些威脅通過阻止所有未經授權的程序安裝或運行,同時還為用戶提供的能力,獲取的方案已被視為資訊科技是安全的。 反可執行幫助電腦的惡意軟件仍然是免費的,企業的數據保持安全;和執行可接受的使用和管理情況。

保持系統軟件免費,無牌

確保該軟件在企業計算機系統的完全授權是一種責任,資訊科技人員認真對待。 如果組織被發現在不遵守,後果可能相當昂貴。 反可執行更容易,以確保電腦仍然完全遵守在任何時候通過阻止未經授權的軟件運行或安裝。 系統仍然完全遵守在任何時候都沒有需要不斷的資訊科技的重視。




Eliminate Threats
To User Productivity
 

Faronics Anti-Executable and its application whitelisting technology ensures endpoint
security and productivity by only allowing approved applications to run on a computer or
server. Any other programs — whether they are unwanted, unlicensed, or simply
unnecessary—are blocked from ever executing.

Application whitelisting also enforces compliance with organizational IT policies. Organizations benefit from productive user sessions each and every time, while IT personnel are guaranteed that desktop computers, notebooks, and servers are compliant with acceptable use policies, regulatory requirements, and software deployment schedules.

The Layered Security Approach

With the number and complexity of malware threats steadily increasing, relying solely on
definition-based anti-malware solutions to ensure IT security is no longer enough.
Anti-Executable offers a necessary additional layer of protection to the existing
"blacklist" solutions such as anti-virus - without the need for definition updates.

Balancing Security with Flexibility

Anti-Executable makes applying Windows and third-party updates easy and effortless. On demand or scheduled maintenance modes allow for application updates and additions with automatic white list population.

Visit the Key Features page for a full listing of Anti-Executable's capabilities and options for the two Windows editions: Standard and Enterprise. These features also apply to the Standard and Enterprise versions of Anti-Executable Server.

 
 

Corporate / Government

Unauthorized or unwanted programs can cause a multitude of security and uptime challenges to corporate computing environments. Distractive and malicious software can be accidentally or intentionally installed on computers from portable drives, email accounts, and web browsing. Allowing these programs to run on workstations presents a serious challenge to IT’s efforts to keep computers running, corporate data secure, and employee productivity high.

Block Distractive Software From Running

Unauthorized applications—such as games and instant messaging clients—serve as distractions to employee productivity and cause corporate systems to be used for unintended purposes. For IT personnel, unauthorized software such as peer-to-peer file sharing applications are a drain on network bandwidth, a serious violation of acceptable use policies, and a threat to corporate data security. Having to repair computers that are experiencing system slowdowns or corruption caused by unauthorized software is a waste of IT resources and time. Anti-Executable’s white list protection eliminates all these problems and threats by ensuring computer workstations are only able to run applications that have been authorized for use. Anti-Executable helps ensure network bandwidth remains efficient, acceptable use policy compliance is enforced, and IT personnel are freed from tedious helpdesk and repair requests.

Stop Malicious Software From Installing

IT administrators are always in a constant battle trying to keep corporate computers and networks free of malicious software—such as keyloggers, spyware, malware, viruses, and trojans. These unwanted pieces of software can seriously cripple computing sessions, create damaging privacy leaks, and hamper employee productivity. As a result of government legislation such as HIPAA and Sarbanes-Oxley, companies must make serious efforts to increase the security and integrity of their data. Anti-Executable protects users from these threats by blocking all unauthorized programs from installing or running while still providing users with the ability to access the programs that have been deemed by IT to be safe. Anti-Executable helps computers remain free of malicious software; corporate data remain secure; and enforces acceptable use and regulatory compliance.

Keep Systems Free Of Unlicensed Software

Ensuring that the software on corporate computer systems is fully licensed is a responsibility that IT personnel take seriously. If organizations are found to be in non-compliance, the consequences can be quite expensive. Anti-Executable makes it easy to ensure that computers remain in full-compliance at all times by preventing unlicensed software from running or installing. Systems remain in full-compliance at all times without the need for constant IT attention.

Comments