F-Secure Elements EPP for Servers

Rozwiązanie określane dawniej jako Server Protection

Kiedy bezpieczeństwo ma kluczowe znaczenie dla ciągłości biznesowej

F-Secure Elements EPP for Servers

Bezpieczeństwo serwerów ma kluczowe znaczenie

Serwery to klucz do komunikacji, współpracy i przechowywania danych w Twojej firmie. Server Protection zapewnia najskuteczniejszą ochronę serwerów, jednocześnie pozwalając im działać z pełną wydajnością.

  • ZAAWANSOWANA OCHRONA PRZED ZŁOŚLIWYM OPROGRAMOWANIEM Wiele mechanizmów detekcji zapewnia znacznie wyższy stopień bezpieczeństwa
  • ZARZĄDZANIE POPRAWKAMI Poprawki ponad 2500 aplikacji serwerowych i oprogramowania firm trzecich, takiego jak Apache, BizTalk, SQL, Flash itd.
  • Centralnie zarządzana zapora sieciowa Zaawansowana zapora sieciowa wzmacnia bezpieczeństwo zapory Windows.
  • KONTROLA APLIKACJI PREMIUM Blokuje lub ogranicza działanie nieautoryzowanych aplikacji.
  • CICHE AKTUALIZACJE Nie wymagają żadnej interakcji ze strony użytkownika i nie zakłócają pracy.

Chronione platformy serwerowe

F-Secure Elements Endpoint Protection offers you the utmost security for Windows, Citrix, and Linux servers while keeping them running at peak performance. You can leverage optional components for specialized servers such as Exchange and SharePoint.

  • Windows Server Protection Nagradzana ochrona i zarządzanie poprawkami dla terminali i serwerów plików Windows.
  • Citrix Protection Certyfikat Citrix-Ready. Pełna obsługa środowisk Citrix, w tym zarządzanie poprawkami dla opublikowanych aplikacji.
  • Linux Protection Zapewnia podstawową ochronę klientów Linuksa, oprócz kluczowego sprawdzania integralności.

Nie narażaj serwerów na niebezpieczeństwo

High-profile attacks have proven that servers remain a critical part of the overall security strategy. Because of the vital role they play, servers are one of the most targeted business assets.

In addition to proper configuration, you need proven security that leverages real-time threat intelligence, modern technologies such as heuristic analysis, and tools like patch management to ensure that security levels meet the rigors of the modern security landscape.

Prawdziwe bezpieczeństwo dla Twoich serwerów

F-Secure Elements Endpoint Protection provides powerful, modern security for your server environment. With real-time threat intelligence via F-Secure Security Cloud, and tools like patch management, your security levels will exceed modern standards.

ZARZĄDZANIE POPRAWKAMI

Automatically keeps software up-to-date to prevent up to 80% of attacks.

 

ZARZĄDZANIE POPRAWKAMI

By automatically keeping all your software up to date with integrated patch management, you can prevent up to 80% of attacks.

NAJLEPSZA OCHRONA

AV-TEST recognized F-Secure with its prestigious Best Protection Award for providing the highest level of protection throughout year 2020.

NAJLEPSZA OCHRONA

F-Secure tops industry as the only vendor with an AV-TEST Best Protection award in 7 out of the last 10 years, giving it the most consistent track record in the industry.

NAJLEPSZY PAKIET DLA PUNKTÓW KOŃCOWYCH

A powerful and comprehensive business endpoint protection in one package, ensuring best value.

NAJLEPSZY PAKIET DLA PUNKTÓW KOŃCOWYCH

By merging your endpoint security into one unified package, we deliver better, broader, and more cost-efficient protection.

SECURITY CLOUD

A cloud-based threat analysis system that builds a real-time picture of the global threat situation.

 

SECURITY CLOUD

This cloud-based system is constantly in touch with client systems, identifying new threats as they emerge and providing protection within minutes.

Szczegóły

Software Updater

Zintegrowane zarządzanie poprawkami

Software Updater is an integrated patch management feature that comes with F-Secure server clients. Unlike with traditional patch management solutions, there is no need to install separate agents, management servers or consoles.

It works by scanning for missing updates in published applications and within server software. It creates a vulnerability report based on missing patches, enabling administrators to patch the vulnerable software when needed, or automatically—with an option for exclusions.

Software Updater covers over 2,500+ server and third-party software, such as Apache, BizTalk, Microsoft SQL, Flash, Java and many others. It can prevent up to 80% of attacks simply by preventing the exploitation of vulnerabilities, as they are commonly used as attack vectors.

DeepGuard 6

Analiza heurystyczna i analiza działania

This new version of DeepGuard combines some of our most advanced security technologies, including artificial intelligence and machine learning. It's the final and most critical layer of defense against new threats—even those that target previously unknown vulnerabilities.

DeepGuard observes application behavior and proactively intercepts any potentially harmful action on the fly before it causes damage. By switching the focus from signature characteristics to malicious behavior patterns, DeepGuard can identify and block malware even before a sample has been acquired and examined.

When an unknown or suspicious program is first launched, DeepGuard temporarily delays its execution to perform a file reputation and prevalence rate check, runs it in a sandbox environment, then finally executes it for behavioral analysis and exploit interception.

For more information about the functions and benefits of DeepGuard, consult our technical whitepaper.

DataGuard

Chroń dane przed atakami typu ransomware

F-Secure DataGuard subjects selected high-risk and value-critical folders to advanced monitoring and additional detection logic. It makes them significantly more fortified against ransomware, and prevents malicious and unknown applications from destroying or tampering with the data that they contain. The high-risk and value-critical folders include, for example, the Downloads folder (web downloads), document folders, temp files (email attachments), and data repositories.

The feature's complementary detection logic significantly increases detection accuracy and aggressiveness against ransomware and their encryption processes. The Data Access module ensures that the data in these folders is not destroyed, tampered with, or encrypted by malicious or unknown applications, such as ransomware. Among other benefits, the Data Access module enables the recovery of data in the event of a successful ransomware attack, as it cannot encrypt the data located in those folders.

F-Secure DataGuard is available in F-Secure Elements EPP for Servers Premium for Windows servers.

Kontrola urządzeń

Dostęp tylko do zaaprobowanego sprzętu

Device Control prevents threats from entering your system via hardware devices such as USB sticks, CD-ROM drives, and web cameras. This also prevents data leakage, by allowing read-only access, for example.

When a prohibited device is plugged in, Device Control turns it off to prevent user access. You can block access to devices by setting predefined rules, and set rules to allow specific devices while all other devices of the same class are blocked. You can for example:

  • Disallow running programs from USB/CD/other drives: disable auto run, accidental execution or loading modules from removable drives.
  • Block device classes completely.
  • Define read-only access to USB/CD/other drives.
  • Block device classes with exception of specified devices.

Device Control is available in F-Secure Elements EPP for Servers for Windows servers.

Kontrola aplikacji

Powstrzymuj aplikacje przed wykonywaniem

Application Control prevents threats from executing and running scripts, even if they bypass other security layers to get onto your device. This mitigates the risks posed by malicious, illegal, and unauthorized software in the corporate environment.

With Application Control you can:

  • Identify and control which applications are allowed to run in your environment
  • Identify trusted, authorized software automatically
  • Prevent all other applications, whether malicious, untrusted, or simply unwanted from running 
  • Eliminate unknown and unwanted applications in your environment to reduce complexity and risk
  • Monitor all applications running within the endpoint environment

Finally, you can use it to block applications from running scripts, for example:

  • Prevent all Microsoft Office applications from running PowerShell scripts
  • Prevent all Microsoft Office applications from running Batch scripts

Application control works based on rules created by our penetration testers that cover attack vectors used to breach into corporate environments. Alternatively, the administrator can define the rules based on various criteria, such as the application name or version.

Application Control is available in F-Secure Elements EPP for Servers Premium for Windows servers.

Security Cloud

Informowanie o zagrożeniach w czasie rzeczywistym

F-Secure Security Cloud is our own cloud-based threat analysis system. It utilizes big data and machine learning, among other input, to continuously add to our knowledge base of digital threats. Security Cloud is constantly in touch with client systems, identifying new threats as they emerge and providing protection within minutes.

A cloud-based threat analysis service affords many benefits over traditional approaches. We gather threat intelligence from a vast number of client nodes, building a real-time picture of the global threat situation. Within minutes, we use that knowledge to protect our customers.

For example, if DeepGuard's heuristic and behavior analysis identifies a zero-day attack, the information is shared with all protected devices via F-Secure Security Cloud—rendering the advanced attack harmless mere minutes after initial detection.

For more details on the functions and benefits of F-Secure Security Cloud, consult our technical white paper

Wielosilnikowa ochrona przed złośliwym oprogramowaniem

Najlepsza ochrona przed złośliwym oprogramowaniem

Our computer security component utilizes our multi-engine security platform to detect and prevent malware. It offers superior protection to traditional signature-based technologies:

  • Detects a broader range of malicious features, patterns, and trends, enabling more reliable and accurate detections, even for previously unseen malware variants.
  • By using real-time look-ups from F-Secure Security Cloud, it can react faster to new and emerging threats in addition to ensuring a small footprint
  • Emulation enables detection of malware that utilizes obfuscation techniques, and offers another layer of security before a file is run.
Ochrona przeglądania

Proaktywne zabezpieczenia internetowe

Browsing Protection is a key security layer that proactively prevents terminal users from visiting malicious sites. This is particularly effective, as early intervention greatly reduces overall exposure to malicious content, and thus to attacks.

For example, Browsing Protection will prevent terminal users from being tricked into accessing seemingly legitimate phishing sites, accessing malicious sites through an email link, or getting infected through malicious third-party advertisements on otherwise legitimate sites.

The feature works by fetching the latest reputation check of the websites and their files from F-Secure's Security Cloud, based on various data points such as IP addresses, URL keywords and site behavior.

Browsing Protection is fully browser agnostic, as it works on the network level. This ensures that it still provides protection even if the end-user is not using company sanctioned browsers.

Ochrona serwerów SharePoint

Bezpieczna współpraca i udostępnianie

We provide additional security components for dedicated SharePoint Servers. They ensure safe file sharing in intranet and extranet SharePoint servers, when the files are either uploaded or downloaded. You get an informative overview of what files have been scanned, with categorization.

The solution uses our multi-engine anti-malware platform. It offers superior protection to traditional signature-based technologies by:

  • detecting a broader range of malicious features, patterns, and trends, enabling more reliable and accurate detection
  • using emulation to detect malware that utilize obfuscation techniques, offering another layer of security before a file is run
Citrix Protection

Dodatkowa ochrona środowisk Citrix

On top of the same core security capabilities as for Windows servers, the Citrix component provides additional protection for Citrix environments by extending the integrated patch management capabilities for published applications. The client is Citrix Ready-certified, ensuring that it works flawlessly in Citrix environments.

Linux Protection

Podstawowe zabezpieczenia dla klientów Linuksa

Linux Security provides core security capabilities for Linux clients: multi-engine anti-malware and built-in firewall management, in addition to vital integrity checking. It is designed to detect and prevent both Windows and Linux-based attacks, making it particularly useful in mixed environments, where an unprotected Linux machine could be used as an easy attack vector.

30-dniowa wersja próbna

F-Secure Elements

Wypróbuj produkt F-Secure Elements przez 30 dni. Na początek proponujemy dwa nagradzane rozwiązania wchodzące w skład tego produktu: F-Secure Elements Endpoint Protection oraz F-Secure Elements Endpoint Protection and Response

  • Najlepsze w branży rozwiązanie do zabezpieczania stacji roboczych z Windows, macOS i Linux — ochrona przed złośliwym oprogramowaniem, końmi trojańskimi i atakami backdoor
  • Natychmiastowa widoczność środowiska informatycznego. Szybkie wykrywanie cyberataków oraz problemów z systemami informatycznymi
  • Reagowanie na zagrożenia przy użyciu automatyki i wytycznych lub korzystanie z pomocy firmy F-Secure w przypadku wykrycia poważnych zagrożeń
  • Informacje o firmie
  • Informacje kontaktowe

Przetwarzamy dane osobowe, które nam udostępniasz, zgodnie z naszą Korporacyjną Polityką Prywatności Biznesu.

Średnie firmy coraz częściej są celem cyberataków

Zwiększ swoje bezpieczeństwo, korzystając z usług partnera doświadczonego w zakresie cyberzabezpieczeń

Skuteczna ochrona wymaga zautomatyzowanych zabezpieczeń, ale potrzebne jest też ludzkie doświadczenie. W pełni zarządzany produkt F-Secure Elements możesz zakupić w formie abonamentu od jednego z naszych certyfikowanych partnerów. Zaletą tej opcji jest fakt, że nieustannie będzie Cię wspierał światowej klasy zespół ekspertów z dziedziny cyberbezpieczeństwa.

Zarządzaj

(detekcją i reakcją w punktach końcowych)

(lukami w zabezpieczeniach)

(ochroną punktów końcowych)

(ochroną Microsoft 365)

z centralnej konsoli zabezpieczeń

Rozwiązanie F-Secure Elements Endpoint Protection jest częścią produktu F-Secure Elements — modułowej, kompleksowej platformy, która zawiera cztery elementy dostarczające pełen zakres wartości w zakresie zabezpieczeń. Z rozwiązania F-Secure Elements Endpoint Protection można korzystać oddzielnie lub dodać do niego detekcję i reakcję na zagrożenia, zarządzanie lukami w zabezpieczeniach oraz ochronę platformy Microsoft 365. W ten sposób zapewnisz firmie kompleksowy pakiet zabezpieczeń, zarządzając wszystkimi funkcjami z poziomu jednej centralnej konsoli.

F-Secure Elements EPP for Servers

Rozwiązanie określane dawniej jako Server Protection