Security solution for endpoint computers that can be managed remotely in terms of installation and updating in order to reduce company costs.
- Avast Endpoint Protection
- License :Trial
- OS:Windows All
- Publisher:AVAST Software
Avast Endpoint Protection Description
avast! Endpoint Protection is designed for keeping malware off company computers at the same time offering the administrator an easy way to control the application from afar.
It has been developed for small office/home office networks with as many as 199 stations connected together, with no server to control them.
The Client version of Endpoint Protection from AVAST has adopted a modern interface that permits easy navigation to important modules such as scan area, the sandbox or detection statistics.
SafeZone, a feature that takes you to a special environment equipped with a secure browser in order to carry out financial transactions safely, is also present in the main application window.
The antivirus component present in the application brings to the table a set of shields in charge with verification of data coming in through the email client, web browser, P2P connections or instant messengers; there is also a shield that intercepts scripts executed on the computer even if they are received through a secure connection.
A behavior shield keeps an eye out on suspicious activity on the system and alerts you when something unusual occurs.
In case you want to try a doubtful program avast! Endpoint Protection provides sandboxing capabilities that allow launching the application in an isolated environment so that the system remains untouched of any changes.
A similar feature is available for conducting financial transactions online in a shielded zone (SafeZone) equipped with a web browser, safe from keylogging risks that might lurk locally.
If you are familiar with any of the Avast products for home users working with the Endpoint Protection version should not be any trouble.
It is easy to use and runs silently in the background at the same time acting promptly when suspicious activity or a real threat is detected.