Prevention is the ONLY Solution A highly strategi
Post# of 82672
A highly strategic cyber security product that can help stop the advanced threat before it has the chance to invade your enterprise.
McAfee and Advanced Cyber Security (ACS) have joined forces to bring you a proactive, security solution that will change the way you look at endpoint security. ACS EndpointLockTM keystroke encryption software offers front line protection against Advanced Persistent Threats (APTs) including zero day and polymorphic threats that evade detection by other security measures. With integration into McAfee® Orchestrator® (McAfee ePOTM) software, EndpointLockTM offers a valuable tool that will help security teams better secure endpoint credentials and corporate data from being stolen.
The Business Problem
Up until now, organizations have lacked the ability to fully protect their endpoints from
a zero day keylogger, the single biggest threat that is leveraged in the first stages of almost all advanced threats. A keylogger is a type of surveillance software that has the capability to record every keystroke you make on your keyboard. In addition, most keyloggers come with the ability to change their form and go on undetected as they quickly spread between the endpoints in your organization.
McAfee & ACS Joint Solution
With EndpointLockTM Keystroke Encryption software, McAfee and ACS provide the missing link in endpoint security by encrypting all of the endpoint’s keystrokes, thus blocking credentials and other sensitive data from ever being stolen. With keystroke encryption, EndpointLockTM stops the advanced threat in its tracks, and is the only patented encryption software that encrypts all keystrokes at the lowest possible layer in the kernel. The encrypted keystrokes are then sent to the browser or desktop application via a patented “Out-of-Band” channel, a separate path that is invisible to keyloggers. ACS EndpointLockTM protects the vulnerable endpoint from exposing sensitive information such as data entered during provisioning of corporate VPN profiles, login credentials and private company information that can lead to a costly data or network breach.
In addition to keystroke encryption, EndpointLockTM also prevents screen scraping and clickjacking, has an anti-subversion feature and alerts of a kernel compromise occurring at one of your endpoints. All of EndpointLock’s patented features work seamlessly in the background without causing any latency as they safeguard your enterprise.
Solution Brief
About Advanced Cyber Security
Advanced Cyber Security is a pioneer in endpoint security, with patented proactive security solutions that help to stop advanced threats in their initial stages and prevent advancement.
About ACSEL (ACS EndpointLockTM) deployment and management with McAfee ePO
The ACSEL “msi” package will reside on the (6) McAfee web server for deployment to workstations. The (1) McAfee ePO Server, together with the (3) McAfee Agent installed on clients interprets policy and installs / maintains ACSEL on all clients according to policy.
During operation:
The ( Agent Handlers and/or (4) Agent-server secure communication (ASSC) reports ACSEL log entries and or alerts back to (1) McAfee ePO Server.
(1) McAfee ePO Server logs in (2) Microsoft SQL database and reports to (10) Automatic Responses
(10) Automatic Responses may open ticket in (9) LDAP or Ticketing system server, and / or (11) Web Console.
About McAfee ePolicy Orchestrator Software
McAfee ePO software is the industry-leading security and compliance management platform. With its single-agent and single-console architecture, McAfee ePO software provides intelligent protection that is automated and actionable, enabling organizations to reduce costs and improve threat protection and compliance.
EndpointLockTM with patented keystroke encryption technology benefits:
Eliminate keylogger capture of keystrokes at all deployed endpoints
Enterprise ACSEL can be easily deployed as part of Group Policy
Event management and reporting options consolidated thru ePO
Kernel level alerts of deep compromise
Take remediation action on the end node based on the file reputation change.
Link to this article:
http://docs.wixstatic.com/ugd/5870e3_70d51d64...21d270.pdf
Zerify Inc (ZRFY) Stock Research Links
Never argue with stupid people, they will drag you down to their level and then beat you with experience.
Get .... PrivacyLok https://cyberidguard.com/
Try SafeVchat: https://cyberidguard.com/
My comments are only my opinion and are not to be used for investment advice.
Please conduct your own due diligence before choosing to buy or sell any stock.