LANDesk Security Suite is a component of the LANDesk Management Suite. It adds security and protection features for the whole infrastructure and data to the entire Landesk suite. When the number of network hazards, applications and mobile devices rises, the number of dangers that IT departments must face increases as well.
It is for this reason that we need a single, complete solution that integrates a firewall, patch management, application control, white and black lists, and other solutions available from a single console.
LANDesk Security Suite is a component of LANDesk Management Suite . It adds security and protection features for the whole infrastructure and data to the entire Landesk suite. When the number of network hazards, applications and mobile devices rises, the number of dangers that IT departments must face increases as well. It is for this reason that we need a single, complete solution that integrates a firewall, patch management, application control, white and black lists, and other solutions available from a single console.
Integrated endpoint protection:
firewall – restricts access to authorised networks or IP addresses – greatly reduces possible system attacks. Offers management of MS Windows firewall – identifies unsecured computers, activates and configures the Windows firewall.
enforcement of policy compliance – (automatic update of computers connecting into the network) application white-black list, requirement to have an antivirus installed on a computer.
application and device control – a single, integrated agent monitoring and protecting the use of programs and devices at end stations.
management console – intuitive operation with a clear dashboard, can be integrated with an LDMS console.
Compatibility assessment and repairs:
Network Access Control – (optional) – works with the LDSD to prevent threatened or incompatible systems from connecting with the network until they are fully operational.
Reports in graphical form visualising security and spyware policy reports. Reporting capabilities of the Security Suite are significant (reports in PDF, HTML and XLS formats), reports can be scheduled and most of the required reports were created during testing.
Device Control – Control over external mass memory use by write blocking, total blockade or content encryption enforcing. We also have I/O port access management (particularly restrictions when writing to USB drives)
Advanced device management capabilities – monitoring access to: drives, USB, modems, communication ports, bridge ports, as well as 802.11x and Bluetooth wireless channels.
Shadow-copy feature – monitoring of files copied to peripheral devices to prevent data leaks to CDs, DVDs or other external media.
Host Based Intrusion Prevention – detecting and blocking unauthorised access in the network (intruders) white lists, black lists – blocking suspicious applications; enabling operation of authorised programs/stopping forbidden applications – including disconnection of system from the network, even if the user changes the file name.
Managing updates of the operating system or selected applications (automatically identifies the operating system and application in need of updating).
Restrictions for groups or individual users – offer greater control over access to specific applications.
Patches/migration – sending automatic tasks, such as patching, to be executed.
Proof of compliance – safety in accordance with several safety protocols.
Capability of sending alerts from monitored systems if configuration is modified or patches are omitted. LANDesk supports sending alerts for defined events.
Antivirus protection (based on the Kaspersky engine) and support for solutions of other manufacturers (McAfee, Norton, Sophos, Symantec and Trend Micro).
Multilayered protection – thanks to the LDSS, we have 5 layers of integrated protection behind the firewall.
Detecting and blocking spyware.
Advanced protection against zero-day attacks, rootkits, spyware, adware, trojans, keyloggers and malware.
Ta strona używa plików cookie, pozostając na stronie zgadzasz się ich wykorzystanie.OKWięcej