High-performing security solution built on strong heritage and established track record in independent testing. Advanced technologies such as cloud-powered scanning and remote administration capability make it a right fi t for any size company
Eliminates all forms of threats, including viruses, rootkits, worms and spyware, keeping your network protected online and off. Optional cloud-powered scanning utilizes our reputation database for increased scanning speed and minimal false positives.
Provides tampering protection and protects the system registry, processes, applications and fi les from unauthorized modification. You can customize the behavior of the system down to every last detail and detect even unknown threats based on suspicious behavior.
Let’s you block unauthorized media and devices based on pre-set rules and parameters. Set access permissions (read/write, read, block) for individual media, devices, users and groups.
Automatically scans USBs, CDs, and DVDs for threats upon insertion to eliminate autorun and other removable risks. Choose from these scanning options: start automatically/notify (prompt user)/do not scan.
Exchange fi les and email attachments among Windows, Mac and Linux endpoints with confi dence that malware targeting any of these platforms will be automatically detected and eliminated. Prevent Macs turning into carriers of malware in the company network.
Leaves more system resources for programs you use daily. Our software also runs smoothly on older hardware, saving your time and costs of having to upgrade your endpoints.
Save logs in common formats – CSV, plain text, or Windows event log for immediate analysis or harvesting. Take advantage of data being readable by 3rd party SIEM tools; RSA enVision is supported directly via a plug-in.
Revert virus signature and module updates to a known good state in case of encountering system incompatibilities. Opt to freeze updates temporarily or until manually changed.