010-68421378
sales@cogitosoft.com
Categories
AddFlow  AmCharts JavaScript Stock Chart AmCharts 4: Charts Aspose.Total for Java Altova SchemaAgent Altova DatabaseSpy Altova MobileTogether Altova UModel  Altova MapForce Altova MapForce Server Altova Authentic Aspose.Total for .NET Altova RaptorXML Server ComponentOne Ultimate Chart FX for SharePoint Chart FX CodeCharge Studio ComponentOne Enterprise combit Report Server Combit List & Label 22 Controls for Visual C++ MFC Chart Pro for Visual C ++ MFC DbVisualizer version 12.1 DemoCharge DXperience Subscription .NET DevExpress Universal Subscription Essential Studio for ASP.NET MVC FusionCharts Suite XT FusionCharts for Flex  FusionExport V2.0 GrapeCity TX Text Control .NET for WPF GrapeCity Spread Studio Highcharts Gantt Highcharts 10.0 版 HelpNDoc Infragistics Ultimate  ImageKit9 ActiveX ImageKit.NET JetBrains--Fleet JetBrains-DataSpell JetBrains--DataGrip jQuery EasyUI jChart FX Plus OPC DA .NET Server Toolkit  OSS ASN.1/C Oxygen XML Author  OSS 4G NAS/C, C++ Encoder Decoder Library OSS ASN.1 Tools for C with 4G S1/X2 OSS ASN.1/C# OSS ASN.1/JAVA OSS ASN.1/C++ OPC HDA .NET Server Toolkit OPC DA .Net Client Development Component PowerBuilder redgate NET Developer Bundle Report Control for Visual C++ MFC  Sencha Test SPC Control Chart Tools for .Net Stimulsoft Reports.PHP Stimulsoft Reports.JS Stimulsoft Reports.Java Stimulsoft Reports. Ultimate Stimulsoft Reports.Wpf Stimulsoft Reports.Silverlight SlickEdit Source Insight Software Verify .Net Coverage Validator Toolkit Pro for VisualC++MFC TeeChart .NET Telerik DevCraft Complete Altova XMLSpy Zend Server

Malwarebytes Endpoint Security

Break the attack chain

Malwarebytes Endpoint Security brings all of our industry-leading protection and remediation technologies into one powerful solution. This multi-layer defense model breaks the attack chain by combining advanced malware detection and remediation, malicious website blocking, ransomware blocking, and exploit protection in a single platform.

Delivering multi-stage attack protection provides companies of all sizes, across all industries, around the globe the ability to stop an attacker at every step.

 

Advantages

Blocks zero-hour malware and ransomware

Reduces the chance of data loss and saves on IT resources by protecting against zero-hour malware and ransomware that traditional security solutions miss.

 

Removes all traces of malware

With the management console feature, you can deploy and configure endpoints as well as manage policies by user group.

 

Frees up IT resources

Maintains productivity by preserving system uptime and reducing the need for reimaging. Reduces the burden on the IT department.

 

Stops malicious websites

Prevents access to known malicious IP addresses so that end users are proactively protected from downloading malware, hacking attempts, redirects to malicious websites, and malvertising.

 

Comprehensive reporting

Identifies vulnerable endpoints and aggregates endpoint reporting. Includes XML logging in machine- and human-readable formats for robust analysis.

 

Scalable threat prevention

Deploys protection for every endpoint as your company grows. Streamlines deployment via the patented virtual deployment simulator.

 

Closes Apple security gap

Removes malware and adware quickly from Mac endpoints with a separate remediation-only client. Cleans OS X systems in less than a minute from start to finish. Separate GUI and command line programs enable flexible deployment using popular Mac management solutions.

 

Incident Response engine

Fast, extremely effective threat scanning with on-demand, scheduled, and automated scan capabilities.

 

Linking Engine

Signature-less technology that identifies and thoroughly removes all threat artifacts linked with the primary threat payload.

 

Core technologies

 

Anti-malware features

Proactive anti-malware scanning engine

Small system footprint

Malicious website blocking

Three scan modes

Compatible with legacy security solutions

Separate remediation-only client for Mac

 

Anti-exploit features

Anti-exploit technology shields vulnerable applications and browsers

Four different layers of protection across stages of an attack

Extremely light 3 MB footprint, no signature database

Compatible with all anti-malware and antivirus products

Customizable protection for third-party or custom apps

 

Anti-ransomware features

Dedicated real-time detection and blocking engine

Proprietary ransomware behavioral technology

Signature-less identification of unknown (zero-hour) ransomware

Small system footprint

Compatible with third-party security solutions

 

Management Console features

 

Centralized management

Multiple client management (up to thousands from a single console)

Push install functionality

Comprehensive policies for different groups

Active Directory integration and synchronization

Virtual deployment simulator

Email notifications

 

Tech specs

Malwarebytes Endpoint Security includes anti-malware and anti-exploit technologies managed by the Management Console, along with our unmanaged Mac remediation and anti-ransomware technologies. Each has individual specs.

 

Management Console (Managed Mode Only)

 

Languages Available

English

Hardware Requirements

CPU: 2 GHz (dual-core 2.6 GHZ or higher recommended)

RAM: 2 GB (4 GB recommended)

Disk space: 10 GB (20 GB recommended)

Screen resolution: 1024x768 or higher

Active internet connection for database updates, product updates and registration

 

Software

Microsoft Internet Explorer 6 (or newer), Firefox, Chrome or Opera browser .NET Framework 3.5

 

Supported Operating Systems

Windows Server 2016 (64-bit)

Windows Server 2012 R2 (64-bit)

Windows Server 2012 (64-bit)

Windows Small Business Server 2011

Windows Server 2008 (32/64-bit)

Windows Server 2008 R2 (32/64-bit)

Please note that Windows servers using the Server Core installation process are specifically excluded

 

Supported Microsoft SQL Servers

SQL Express 2008 (shipped with product, subject to review 10 GB maximum database size limitation)

SQL Server 2008

SQL Server 2012

SQL Server 2014

SQL Server 2016

Please note that Windows servers using the Server Core installation process are specifically excluded.

 

Anti-Malware for Business

Languages Available

English, Bosnian, Bulgarian, Catalan, Chinese Simplified, Chinese Traditional, Croatian, Czech, Danish, Dutch, Estonian, Finnish, French, German, Greek, Hebrew, Hungarian, Italian, Latvian, Lithuanian, Macedonian, Norwegian, Polish, Portuguese (Brazil), Portuguese (Portugal), Romanian, Russian, Serbian, Slovak, Slovenian, Spanish, Swedish, Thai, Turkish, Vietnamese.

 

Software

Microsoft Internet Explorer 6 (or newer), Firefox, Chrome or Opera browser

 

Hardware Requirements

256MB of RAM (512MB or more recommended)

800MHz CPU or faster

20MB of free hard disk space

800x600 or greater screen resolution

Active Internet Connection, for license validation and threat signature updates

USB Port (optional, depending on deployment method)

 

Supported Operating Systems

Windows 10 ® (32-bit, 64-bit)

Windows 8.1 ® (32-bit, 64-bit)

Windows 8 ® (32-bit, 64-bit)

Windows 7 ® (32-bit, 64-bit)

Windows Vista ® (32-bit, 64-bit)

Windows XP ® (Service Pack 3 or later) (32-bit only)

Windows Server 2016 (64-bit)

Windows Server 2012 R2 ® (32-bit, 64-bit)

Windows Server 2012 ® (32-bit, 64-bit)

Windows Small Business Server 2011

Windows Server 2008 R2 ® (32-bit, 64-bit)

Windows Server 2008 ® (32-bit, 64-bit)

Windows Server 2003 ® (32-bit only)

Please note that Windows servers using the Server Core installation process are specifically excluded.

 

Additional Requirements for Managed Mode

Windows Installer 4.0 (Windows XP only, already included in other Windows versions)

.NET Framework 3.5 (Windows XP, Windows 8.0/8.1, Windows 10)

.NET Framework 4.0 (Windows Vista, Windows 7, Windows 8)

 

Anti-Exploit for Business

 

Languages Available

English

 

Hardware Requirements

CPU: 800MHz CPU

RAM: 1024 MB (512 MB or more recommended)

Disk space: 10 MB

Screen resolution: 800x600 or greater updates

 

Supported Operating Systems

Windows 10® (32-bit, 64-bit)

Windows 8.1® (32-bit, 64-bit)

Windows 8® (32-bit, 64-bit)

Windows 7® (32-bit, 64-bit)

Windows Vista® (32-bit, 64-bit)

Windows XP® (32-bit, 64-bit, Service Pack 3 or later)

Windows Server 2008® (32-bit, 64-bit)

Windows Server 2008® R2 (32-bit, 64-bit)

Windows Small Business Server 2011

Windows Server 2012® (64-bit)

Windows Server 2012® R2 (64-bit)

Windows Server 2016 (64-bit)

 

Additional Requirements for Managed Mode

Windows Installer 4.0 (Windows XP only, already included in other Windows versions)

.NET Framework 3.5 (Windows XP, Windows 8.0/8.1, Windows 10)

.NET Framework 4.0 (Windows Vista, Windows 7, Windows 8)

 

Mac Remediation

 

Languages Available

English

 

Hardware Requirements

Any Apple Mac device that supports Mac OS X version 10.8 or later

Active Internet connection updates

 

Supported Operating Systems

Mac OS X version 10.8 or later

 

Security & Privacy

Allow apps to be downloaded from the Mac App Store and identified developers (the most restrictive setting)

 

Anti-Ransomware

 

Languages Available

English

 

Hardware Requirements

CPU: 800 Mhz

RAM: 1024 MB

Disk space: 100 MB

Screen resolution: 800x600 or greater

Active Internet connection for product updates and registration

 

Software

Microsoft Internet Explorer 6 (or newer), Firefox, Chrome, or Opera browser

 

Supported Operating Systems

Windows 10 (32-bit, 64-bit)

Windows 8.1 (32-bit, 64-bit)

Windows 8 (32-bit, 64-bit)

Windows 7 (32-bit, 64-bit) Software
Microsoft Internet Explorer 6 (or newer), Firefox, Chrome or Opera browser

Quick Navigation;

© Copyright 2000-2023  COGITO SOFTWARE CO.,LTD. All rights reserved