Recommended Solutions 1 - 8 of 8
|Lumension PatchLink Security Configuration Management |
Lumension (SecureWave) PatchLink Security Configuration Management provides out-of-the-box regulatory, standards-based assessment and industry best practices templates to ensure endpoints and applications are properly configured.
|Lumension Sanctuary Application Control |
Lumension (SecureWave) Sanctuary preserves the security of your environment while dramatically minimizing the inherent risks of downloading or installing new applications.
|Lumension Sanctuary Device Control |
Lumension (SecureWave) Sanctuary Device Control is an End-Point Policy Enforcement solution that stops security breaches before they can even start.
|Symantec Critical System Protection |
Symantec Critical System Protection is intrusion detection software that protects against day zero attacks, hardens systems, and helps maintain compliance by enforcing behavior-based security policies on clients and servers.
|Symantec Endpoint Encryption |
Symantec Endpoint Encryption provides advanced encryption for desktops, laptops, and removable storage devices. It offers scalable, enterprise-wide security that prevents unauthorized access by using strong access control and powerful encryption.
|Symantec Endpoint Protection Managed Service Support |
CST's Symantec Endpoint Protection MSS (Managed Service Support) is designed to remove, and significantly reduce the resource burden's that a customer has to sustain for the administration, usage and optimum performance of SEP.
|Symantec Endpoint Protection |
Symantec Endpoint Protection 11.0 combines Symantec AntiVirus with advanced threat prevention to deliver unmatched defense against malware for laptops, desktops and servers. It seamlessly integrates essential security technologies in a single agent and management console, increasing protection and helping lower total cost of ownership.
|Symantec Network Access Control |
Symantec Network Access Control is an end-to-end solution that securely controls access to corporate networks, enforces endpoint security policy, and easily integrates with existing network infrastructures.