Endpoint Security

360 degree all-round protection for your endpoints

70% of all malware attacks originate at the endpoints and almost as many enter the network. Matrix42 Endpoint Security provides companies with 360° security management for the prevention and protection of devices, systems and data. The special feature: The solution automates the entire process from prevention and detection to countermeasures in the event of damage, without loss of productivity.


 

Only a managed IT workplace is a secure IT workplace. By acquiring EgoSecure, one of the leading German software provider for Endpoint Security, Matrix42 extends its solution portfolio with data encryption, interface and application control as well as security monitoring. Companies benefit from 360° security management providing a higher degree of automation to protect their data and endpoints.


Endpoint Security Compliance

Full control over the devices and applications used

Endpoint Security Protection

Full control over your data through encryption

Endpoint Security Prevention

Preventive security for data through analyses and regulations

Automated Endpoint Detection & Response

Automatically secure end devices and defend against attacks


Difference between endpoint security, antivirus and firewalls

Software for endpoint security is an important protection factor against ransomware and other attacks today. The software provides an additional layer of protection against malware that goes far beyond what antivirus solutions and firewalls can provide. The solution also helps you to implement and comply with security guidelines.


Endpoint Security Compliance

Full control over the devices and applications used


Device Control


The software determines the use and scope of use of devices (e.g. USB sticks, CDs, TV tuners) or interfaces (e.g. WLAN, Firewire, USB).

This prevents the loss of data and the intrusion of malware into the network via the interfaces.

Application Control


The software controls which user calls which programs. This blocks the start of unlicensed or unauthorized software. This reduces possible liability risks and the risk of economic damage, e.g. through subsequent licensing.

Secure Audit


The software makes data flows visible and shows possible weaknesses in the protection settings. In addition, forensic information can be determined. This protocol is prescribed by the Federal Data Protection Act. A four- or six-eye principle protects the rights of employees.


Endpoint Security Protection

Full control over your data through encryption

Loss or theft of end devices is part of everyday life. Sensitive data falls into the wrong hands in this way. Encrypting the data ensures that authorized users have access to the device and the data. Smart Cards and eToken increase the security of encryption. Our software is FIPS 140-2 Level 1 certified and supports the Advanced Encryption Standard New Instructions (AES-NI).


Endpoint Security Prevention

Preventive security for data through analyses and regulations

The solution offers your organization granular and reliable protection for data communication. Work processes and data transfer will not be hindered. The software first determines the relevant overall data security situation in the network.


Automated Endpoint Detection & Response

Automatically secure end devices and defend against attacks

We secure your end devices with an agent. The software supports the defense of ransomware and unknown attacks by means of a multi-level defense system. The solution with advanced machine learning technologies and behavioral analysis maximizes protection and minimizes false positives. For example, this helps you block zero-day attacks that exploit memory-based vulnerabilities in popular applications.


Read here …

… how our customers protect their endpoints and data, automatically block attacks and maintain control at all times.

Protection against sophisticated cyber-attacks at ZAE Bayern
Comprehensive protection, easy deployment and centralized, real-time view of device status.
Download now
KWM WEISSHAAR controls security from central console
Learn how KWM WEISSHAAR controls security from one central console.
Download now

Automated Endpoint Security

powered by enSilo

enSilo is a data protection platform that combines the functions of an Endpoint Prevention Platform (EPP) with those of an Endpoint Detection and Response (EDR) and enables the control of application communication. And in real time.


Avoid the Cyber Kill

Automated Endpoint SecurityAutomated Endpoint SecurityAutomated Endpoint SecurityAutomated Endpoint Security

Infiltration cannot always be prevented. Our solution focuses on securing your data so that it cannot be encrypted, manipulated or stolen. This gives your IT security department enough time to analyze the entrance gates for possible security gaps and develop counter-strategies.

Red card for Spectre and Meltdown!

Matrix42’s Automated Endpoint Security powered by enSilo provides complete protection against malware such as Spectre and Meltdown. Read current facts in our blog post.

Learn more!

The Endpoint Security Partnership

Matrix42, the leading provider of workspace management solutions, has entered into a strategic partnership with enSilo and now offers the innovative security company’s products exclusively in Central Europe and integrates enSilo into its comprehensive Workspace Management Suite.


How it works

ENSILO COLLECTOR

ENSILO COLLECTOR

Step 1:

Collector collects operating system metadata.

 

during connection establishment Pfeil during data modification


CONSEQUENTIAL ACTIVITIES

Step 2:

When a connection is established or a file is modified, a snapshot is sent to the core.

ENSILO CORE

ENSILO CORE

Step 3:

The core analyzes the metadata and prevents data theft or Ransomware attack.

 

Step 4:

Only legitimate connections or file modifications are allowed.


Advantages

Prevent data theft in real time

enSilo protects data in real time against theft because it works at the operating system level. This prevents data from being stolen.

Real-time protection against Ransomware

enSilo stops the attackers like Bad Rabbit before data can be encrypted. It works at operating system level and is therefore the only universal solution.

Smooth security prevents data theft in real time

Security should not have a negative impact on business processes. Even with a compressed system you should be able to continue working.

One alert per active threat

enSilo only warns you after it has prevented malicious outbound communication, data manipulation or unauthorized encryption.

„Chief Information Security Officers and other IT security decision makers new security technology vendors should consider using the support a secure digital workplace.“ Gartner, Cool Vendor 2016

Matrix42 is Member of the Cyber-Security Council Germany e.V.

Live Demo: Cyberangriffe aus dem Nichts!

Erfahren Sie in unserer Live Demo, wie Sie mit einer vollautomatisierten Endpoint Detection and Response-Lösung (EDR), die auf Machine Learning und Artificial Intelligence basiert, Zero-Day Attacken von Malware in Echtzeit erkennen und und stoppen!

Mehr erfahren!

Endpoint Security

360 degree all-round protection for your endpoints

Matrix42 Endpoint Security provides companies with 360° security management for the prevention and protection of devices, systems and data. The solution automates the entire process from prevention and detection to countermeasures in the event of damage, without loss of productivity.


 

Mit der Übernahme des führenden deutschen Anbieters für Endpoint Security EgoSecure verschmelzen klassisches Geräte- und Software Management mit Endpoint Security. Erfahren Sie mehr über die Vorteile im Interview mit Sergej Schlotthauer, VP Security, Matrix42.

 

Software Management und Security gehören zusammen!


Frequently Asked Questions

Endpoint Security Compliance

Volle Kontrolle über die verwendeten Geräte und Anwendungen

Endpoint Security Protection

Volle Kontrolle über Ihre Daten durch Verschlüsselung

Endpoint Security Prevention

Vorbeugende Sicherheit für Daten durch Analysen und Regelwerke

Automated Endpoint Detection & Response

Automatisch Endgeräten absichern und Angriffe abwehren


Data Protection

After analyzing the data flow and determining the weak points with Insight and IntellAct, the protective measures can be individually configured with 20 protective functions. These protective functions are based on the i.C.A.F.E. PRINCIPLE.

All functions are integrated in one solution, access only one database and are controlled by a central management console. There is only one installation, after which the functions can be activated according to the protection requirements. A later adjustment of the protection requirement does not require a new installation.

Our solution enables a simple and fast installation without complex and costly consulting support. EgoSecure Data Protection consists mainly of in-house developments and therefore has a uniform installation, administration and operation concept.

All protection functions focus on making it as easy as possible for the user and yet secure. This is what we call “nice IT security”.

 


Added values


  • All-in-one solution for your data security

  • Very low administration effort

  • Compliance according to EU-DSGVO, CCPA and Co.

  • Reliable system protection in the background

  • Continuous development in dialogue with customers

  • Greater transparency through real-time reporting and dashboards

  • Adapted to your business needs

  • Simple and fast installation, intuitive administration

  • Integrations to Unified Endpoint Management, Service Management and Software Asset Management

Endpoint Security Compliance

Volle Kontrolle über die verwendeten Geräte und Anwendungen


Device Control


Die Software bestimmt die Nutzung und den Umfang der Nutzung von Devices (z. B. USB Sticks, CDs, TV Tuner) oder Schnittstellen (z. B. WLAN, Firewire, USB).

Das verhindert den Verlust von Daten und das Eindringen von Malware über die Schnittstellen in das Netzwerk.

Application Control


Die Software kontrolliert, welcher Benutzer welche Programme aufruft. Das blockt den Start unlizenzierter oder unauthorisierter Software. Sie reduzieren damit mögliche Haftungsrisiken und das Risiko wirtschaftlicher Schäden z.B. durch Nachlizensierung.

Secure Audit


Die Software macht Datenflüsse sichtbar und zeigt mögliche Schwächen in den Schutzeinstellungen. Zusätzlich ist die Ermittlung forensischer Informationen möglich. Das Bundesdatenschutzgesetz schreibt dieses Protokoll vor. Ein Vier- oder Sechs-Augen Prinzip schützt dabei die Rechte der Mitarbeiter.



The protective functions for the security of your data:


INTELLACT

To ensure that the protective measures are optimally introduced, the INSIGHT module first determines the overall situation in the company network that is relevant to data security.

The results of this analysis are then processed in a manner suitable for management and presented in graphs and tables. In this way, INSIGHT provides the facts that paint an overall picture of data security for each individual company and organisation. The presentation is cumulative, so that conclusions about the activities of individual users are not possible. The data in this form is optimal for setting up the protective measures that are really needed.

Learn more about INSIGHT here. 


CONTROL


AUDIT


FILTER


ENCRYPTION


Tools

Read here …

… how our customers protect their endpoints and data, automatically fend off attacks and maintain control at all times.

Protection against sophisticated cyber-attacks at ZAE Bayern
Comprehensive protection, easy deployment and centralized, real-time view of device status.
Download now
KWM WEISSHAAR controls security from central console
Learn how KWM WEISSHAAR controls security from one central console.
Download now

Automated Endpoint Detection & Response

powered by enSilo

The software is a platform for data protection that combines the functions of endpoint security prevention with those of endpoint detection and response (EDR) and enables control of the applications’ communication. And it does so in real time.


Here you can download the brochure on functional descriptions.

Automatically secure end devices and fend off attacks

Today, endpoint security software is an important protection factor against ransomware and other attacks. The software provides an additional layer of protection against malware that goes far beyond what antivirus solutions and firewalls can offer. It also helps you implement and maintain security policies.

We secure your end devices with an agent.  The software helps to defend against ransomware and unknown attacks with a multi-level defense system. The solution with advanced machine learning technologies and behavior analysis maximizes protection and minimizes false positives. For example, it helps you block zero-day attacks that exploit memory-based vulnerabilities in common applications.


Added values

The penetration of malware cannot always be prevented. The software secures the starting points against unauthorized data transfer. This gives your IT sufficient time to analyze the entrance gates for possible security gaps and develop counter strategies.


  • Prevention of data theft in real time

    Matrix42 protects data from theft in real time because it operates at the operating system level. This prevents data from being stolen.

  • Real-time protection against ransomware

    Matrix42 stops attackers like Bad Rabbit before data can be encrypted. It works on the operating system level and is therefore the only universal solution.

  • Smooth security prevents real-time data theft

    Security should not have a negative impact on business processes. You should be able to continue working even with a compressed system.

  • One alert per active threat

    Matrix42 only warns you after it has prevented malicious outbound communication, data manipulation or unauthorized encryption.

Live Demo: Cyberangriffe aus dem Nichts!

Erfahren Sie in unserer Live Demo, wie Sie mit einer vollautomatisierten Endpoint Detection and Response-Lösung (EDR), die auf Machine Learning und Artificial Intelligence basiert, Zero-Day Attacken von Malware in Echtzeit erkennen und und stoppen!

Mehr erfahren!

Die Partnerschaft für Endpoint Security

Matrix42, führender Anbieter für Workspace Management Lösungen, hat eine strategische Partnerschaft mit enSilo abgeschlossen und bietet ab sofort die Produkte des innovativen Security-Unternehmens exklusiv in Zentraleuropa an und integriert enSilo in seine ganzheitliche Workspace Management Suite.


Functionality

The software is a platform for data protection that combines the functions of endpoint security prevention with those of endpoint detection and response (EDR) and enables control of the applications’ communication. And it does so in real time.


ENSILO COLLECTOR

ENSILO COLLECTOR

Step 1:

Collector recorded
Operating system metadata.

 

on connection
Pfeil
with file modification


ACTIVITIES ASSOCIATED WITH CONSISTENCY

Step 2:

A snapshot is sent to the core during connection establishment or file modification.

ENSILO CORE

ENSILO CORE

Step 3:

The core analyses the metadata and prevents data theft or ransomware attack.

 

Step 4:

Only legitimate connections or file modifications are made
approved.


Vorteile

Prevention of data theft in real time

enSilo protects data from theft in real time because it works on the operating system level. This prevents data from being stolen.

Real-time protection against ransomware

enSilo stops attackers like Bad Rabbit before data can be encrypted. It works on the operating system level and is therefore the only universal solution.

Smooth security prevents real-time data theft

Security should not have a negative impact on business processes. You should be able to continue working even with a compressed system.

One alert per active threat

enSilo only warns you after it has prevented harmful out-bound communication, data manipulation or unauthorized encryption.

“Chief Information Security Officers and other decision makers for IT security should consider new providers of security technologies that support a secure digital workplace.” Gartner, Cool Vendor 2016
 
 
 
 

Matrix42 is member of the Cyber-Sicherheitsrat e.V.

Logo des Cyber Sicherheitsrat e.V.