Cisco Endpoint Security

Endpoint protection is accomplished using Cisco Secure Endpoint technology. A cloud service that uses an installed client to monitor the status and behaviour of devices. This makes it possible to detect device infections and manually or automatically force re-securing of the device.

 

Product description

Cisco Secure Endpoint supports a range of the most common operating systems such as Windows, Linux and macOS, as well as Android and iOS mobile platforms. By installing the client to gain access to these devices, it is possible to protect against not only threats such as viruses, but also advanced malware or attacks through vulnerabilities in software, as well as illegitimate use of legitimate applications.

Secure Endpoint monitors the behaviour of the device and if it detects a deviation from the normal state, which may also show signs of malware behaviour or signs of an attack, it will automatically react to protect your device. These signs are dynamically extracted from the Cisco Talos global database and also evaluated using artificial intelligence and machine learning.

It allows the administrator to get real-time information about running processes, installed software and its vulnerabilities, as well as connected USB devices and the ability to block this feature.

Features

Protection against viruses and malware

Machine learning and artificial intelligence

Access to running processes

USB port protection

Broad operating system support

Server protection

Benefits

Cloud technology = access from anywhere

Protection of equipment moving outside the perimeter

The largest and worldwide Cisco Talos database

Why ALEF?

  • Strong technical team specialising in remote collaboration
  • Unique know-how in the areas of solution design, implementation and subsequent management
  • Dozens of satisfied customers

Who is the product for?

For customers who want to protect users' end devices or servers, for example. For those who want to keep track of the status of their devices and protect them from threats and attacks.

Contact

Please contact us in case of any questions.

Contact us

 

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

 

Meet us at events

F5 AppWorld Berlin
6. - 7. 5. 2025

Gitex Berlin
21. - 23. 5. 2025

Cyber Security & Cloud Expo Europe
24. - 25 .9. 2025

IT-SA
7. - 9. 10. 2025

Gitex Dubai
13. - 17. 10. 2025