- Continuous behavioral monitoring of the client helps create a complete profile of file activity, application and process activity, and network activity. This allows for protection against both file-based and fileless malware and delivers a 360-degree attack view with actionable intelligence relevant for investigations.
- Multiple layered, heuristic-based techniques for protection include cloud intelligence, advanced static analysis and dynamic behavioral protection. These helps protect against and remediate known and unknown malware.
- No need for regular scans or periodic updates enables the highest level of protection at all times without hampering user productivity.
- Unique rollback capabilities also support policies that not only remove the threat completely but also restore a targeted client to the state before the malware activity initiated. This eliminates the need for manual restoration in the case of ransomware and similar attacks.
- Cloud-based management console reduces the footprint and overhead of management. It also improves the ability to deploy and enforce endpoint protection, wherever the endpoint is.
- Integration with the SonicWall next-generation firewalls delivers zero-touch deployment and enhanced endpoint compliance. Plus it enables enforcement of deep packet inspection of encrypted traffic (DPI-SSL) by deploying trusted certificates to each endpoint.
- Centralized Management and Client Protection Reporting The SonicWall cloud-based management console functions as a single pane of glass to manage all client policies, including next-generation malware protection, DPI-SSL certificate management, content filtering and VPN.
- The management console is a multitenant cloud-based platform offered at no additional cost. It provides client protection reporting and policy management, with support for fine-grain access control policies. These allow managed service providers (MSPs) to manage and report on clients of multiple customers. At the same time, each of those customers can only manage and report on their own clients. It also functions as an investigative platform to help identify the root cause of detected malware threats and provide actionable intelligence about how to prevent these from recurring. For example, an administrator can easily view what applications are running on a client. That, in turn, can help identify machines that may be running vulnerable or unauthorized software.