aranda-360-end-point

Aranda 360
Endpoint Security

Fully protect computers and vital company information
against external attacks and data theft

Eliminate system vulnerabilities on devices in your corporate network. Protect the endpoints of your network (desktops and laptops, devices used by personnel who are working on the field, in transit and also in the office) of the constant security threats that exist.

With Aranda 360, challenges faced by IT administrators to meet regulatory requirements, defense against network attacks, and obstructions from new virus infections in these relatively uncontrolled systems will be a thing of the past.

Aranda Software faces this challenge with the Aranda 360 Endpoint Security security suite. Providing consistent and accurate 360 ​​degree protection, this modular system integrates a variety of robust security features into a single environment. With only a single agent, it protects the entire infrastructure of workstations and laptops against known or unknown attacks and against theft of information, without interrupting the activity of end users.


*Nombre y Apellido
 
*Email
*Cargo
 
*Empresa
*Teléfono
 
*País
Comentarios
*Ciudad

With this modular solution you will be able to:

Protect workstations with a rules-based intrusion detection system that prevents unwanted connections and self-learns the behavior of applications in the system.

Maintain control of mobile devices and removable storage devices, with constant monitoring of operations.

Web Service:

Secure data stored on your computers and devices by encrypting content for files and folders.

Aranda 360 Endpoint Security recovers endpoint control to the IT department, giving administrators granular tools to manage and secure workstations, laptops, and mobile devices. These protections operate regardless of the location of the endpoint, regardless of whether they are within the corporate network, connected to an external home network or to a wireless network. Policies can change dynamically depending on the context of connectivity, the current user and the conformity assessment of the machine, ensuring that the safety meets or exceeds the levels of risk. Once the security policies have been configured and implemented in the Aranda 360 administration console, they cannot be disabled or modified by the user; Even if that user has administrator privileges.

Combining distributed protection, easy, centralized management and full control, Aranda 360 Endpoint Security enables IT departments to regain full control of their security infrastructure for endpoints on the network.

Benefits
  • Cost reduction and easy management in a comprehensive solution.
  • Consistent security for endpoints to ensure compliance.
  • Policies based on contexts that dynamically adapt security measures for each level of risk.
  • Unique security based on behavioral profiles to deal with unknown threats and zero-day attacks.
  • Centralized management console for extensive monitoring of endpoint security status in real time.
  • Interoperability with other leading NAC solutions to provide a complete point-to-point network access control solution.
  • Control applications that can adversely affect network and user productivity such as P2P, VoIP and instant messaging.
  • Reduces the administrator’s workload by allowing specific tasks to be shared with other work teams through role-based management.
  • Protection against operating system vulnerabilities and third-party applications that are unpatched.
  • Facility in the massive deployment of a single security agent and integration with other software distribution solutions.
  • Integration with Active Directory and multiple monitoring and correlation events (SIEM) solutions.
  • Unique security based on behavioral profiles to deal with unknown threats and zero-day attacks.
  • Protection against operating system vulnerabilities and third-party applications that are unpatched.
  • Facility in the massive deployment of a single security agent and integration with other software distribution solutions.
  • Integration with Active Directory and multiple monitoring and correlation events (SIEM) solutions.
  • Unique security based on behavioral profiles to deal with unknown threats and zero-day attacks.
Functionalities

Host-level Intrusion Prevention System (HIPS) and Firewall:
• Rules-based protection o Control access to applications, file types, directories, control panel, and Windows registry. O Control incoming and outgoing connections for each application.
• System Hardening and Behavior Analysis or Detection, alert and blocking generic attack mechanisms such as buffer-overflows, or keyloggers. O Self-learning of normal application behavior. O Identification and blocking of Zero-Day exploits and unknown malware.
• Intrusion prevention at the network level or Checking the integrity of network protocols o Detection and blocking of network intrusion mechanisms such as port-scanning or ip-flooding.

Application and File Control:
• Control of software installation and execution of applications.
• Reinforcement of control by means of white lists or black lists.
• Protection against interruption of critical applications.
• Granular controls to limit access to files.

Network Access Control (NAC):
• Verification of running applications, files and update patches.
• Reinforcement at the customer level of network access control policies.
• Interoperability with Juniper UAC solutions, Microsoft NAP, Cisco NAC and many other vendors of VPN solutions.

Wireless Security (Wi-Fi):
• Wi-Fi connectivity point-to-point (Ad Hoc), and Bluetooth.
• Forces the use of VPN in the connections to public WiFi access points.
• Forcing the use of authentication and encryption methods on Wi-Fi connections (WEP, WPA, WPA2, etc.).
• White lists of authorized Wi-Fi access points.
• Enable the “No Wi-Fi” policy inside or outside the company.

Device Control:
• Granular access permissions to removable storage devices.
• Control by type, model, and serial number of the device.
• Control of read and write operations by file type.
• Monitoring operations on removable devices.
• Control over different types of USB / Firewire devices.
• Encryption of files stored on removable devices (pendrives).

Encryption of Content:
• Transparent and “on-the-fly” encryption of files.
• Encryption policies based on files and directories, with centralized administration.
• Optional secondary authentication and integration with strong authentication methods.
• Allows the end user to create encrypted files protected by passwords.
• Secure file deletion and swap file cleanup.

Case Creator: Streamline the contact process and response times of the service desk, using email as an alternative to generate cases automatically and obtain the record of information by case and their respective storage.

Web Access: Specialists, supervisors, administrators and end users have access to a web console, without time limitations to file incidents, service calls, consult and follow up on information related to any case generated, without taking time to consult the Service table

System Requirements

Agent

Processor Intel / AMD Compatible (x86 / x64) 2 GHz
Memory 512 MB or higher
Operating System Microsoft Windows XP SP2, Vista, 7 (32 & 64 Bit)
Free space on DD 50 MB

Master Server

Processor Intel / AMD Compatible (x86 / x64) 2 GHz
Memory 2 GB RAM (add 512 MB per 500 Agents)
Operating System Microsoft Windows Server 2003 SP2, 2008 R2
Free space on DD 4 GB

Database

Note: Available hard disk space is 30MB / Agent / year

No. of Agents  1 a 500 501 onwards
Database Engine Microsoft SQL Server 2005/2008 Express Edition (included) Microsoft SQL Server 2005/2008 Standard / Enterprise Edition

Console Administration

Operating System • Microsoft Windows Server 2003, 2008, XP, Vista, 7 (32 & 64 Bit)
• Microsoft Windows Server 2003 SP2
• Microsoft Windows Server 2008 R2
Free space on DD 50 MB

Contact us, we will contact you
as soon as possible


*Nombre y Apellido
 
*Email
*Cargo
 
*Empresa
*Teléfono
 
*País
Comentarios
*Ciudad

Hundreds of IT professionals rely on our solutions

Start typing and press Enter to search

Top