Endpoint Security

360 degree all-round protection for your endpoints

70% of all malware attacks originate at the endpoints and almost as many enter the network. Matrix42 Endpoint Security provides companies with 360° security management for the prevention and protection of devices, systems and data. The special feature: The solution automates the entire process from prevention and detection to countermeasures in the event of damage, without loss of productivity.


 

Only a managed IT workplace is a secure IT workplace. By acquiring EgoSecure, one of the leading German software provider for Endpoint Security, Matrix42 extends its solution portfolio with data encryption, interface and application control as well as security monitoring. Companies benefit from 360° security management providing a higher degree of automation to protect their data and endpoints.


Endpoint Security Compliance

Full control over the devices and applications used

Endpoint Security Protection

Full control over your data through encryption

Endpoint Security Prevention

Preventive security for data through analyses and regulations

Automated Endpoint Detection & Response

Automatically secure end devices and defend against attacks


Difference between endpoint security, antivirus and firewalls

Software for endpoint security is an important protection factor against ransomware and other attacks today. The software provides an additional layer of protection against malware that goes far beyond what antivirus solutions and firewalls can provide. The solution also helps you to implement and comply with security guidelines.


Endpoint Security Compliance

Full control over the devices and applications used


Device Control


The software determines the use and scope of use of devices (e.g. USB sticks, CDs, TV tuners) or interfaces (e.g. WLAN, Firewire, USB).

This prevents the loss of data and the intrusion of malware into the network via the interfaces.

Application Control


The software controls which user calls which programs. This blocks the start of unlicensed or unauthorized software. This reduces possible liability risks and the risk of economic damage, e.g. through subsequent licensing.

Secure Audit


The software makes data flows visible and shows possible weaknesses in the protection settings. In addition, forensic information can be determined. This protocol is prescribed by the Federal Data Protection Act. A four- or six-eye principle protects the rights of employees.


Endpoint Security Protection

Full control over your data through encryption

Loss or theft of end devices is part of everyday life. Sensitive data falls into the wrong hands in this way. Encrypting the data ensures that authorized users have access to the device and the data. Smart Cards and eToken increase the security of encryption. Our software is FIPS 140-2 Level 1 certified and supports the Advanced Encryption Standard New Instructions (AES-NI).


Endpoint Security Prevention

Preventive security for data through analyses and regulations

The solution offers your organization granular and reliable protection for data communication. Work processes and data transfer will not be hindered. The software first determines the relevant overall data security situation in the network.


Automated Endpoint Detection & Response

Automatically secure end devices and defend against attacks

We secure your end devices with an agent. The software supports the defense of ransomware and unknown attacks by means of a multi-level defense system. The solution with advanced machine learning technologies and behavioral analysis maximizes protection and minimizes false positives. For example, this helps you block zero-day attacks that exploit memory-based vulnerabilities in popular applications.


Automated Endpoint Security

powered by enSilo

enSilo is a data protection platform that combines the functions of an Endpoint Prevention Platform (EPP) with those of an Endpoint Detection and Response (EDR) and enables the control of application communication.

And in real time.


Avoid the Cyber Kill

Automated Endpoint SecurityAutomated Endpoint SecurityAutomated Endpoint SecurityAutomated Endpoint Security

Infiltration cannot always be prevented. Our solution focuses on securing your data so that it cannot be encrypted, manipulated or stolen. This gives your IT security department enough time to analyze the entrance gates for possible security gaps and develop counter-strategies.

Red card for Spectre and Meltdown!

Matrix42’s Automated Endpoint Security powered by enSilo provides complete protection against malware such as Spectre and Meltdown. Read current facts in our blog post.

Learn more!

The Automated Endpoint Security Partnership

Matrix42, the leading provider of workspace management solutions, has entered into a strategic partnership with enSilo and now offers the innovative security company’s products exclusively in Central Europe and integrates enSilo into its comprehensive Workspace Management Suite.


How it works

ENSILO COLLECTOR

ENSILO COLLECTOR

Step 1:

Collector collects operating system metadata.

during connection establishment
Pfeil
during data modification


CONSEQUENTIAL ACTIVITIES

Step 2:

When a connection is established or a file is modified, a snapshot is sent to the core.

ENSILO CORE

ENSILO CORE

Step 3:

The core analyzes the metadata and prevents data theft or Ransomware attack.

Step 4:

Only legitimate connections or file modifications are allowed.


Advantages

Prevent data theft in real time

enSilo protects data in real time against theft because it works at the operating system level. This prevents data from being stolen.

Real-time protection against Ransomware

enSilo stops the attackers like Bad Rabbit before data can be encrypted. It works at operating system level and is therefore the only universal solution.

Smooth security prevents data theft in real time

Security should not have a negative impact on business processes. Even with a compressed system you should be able to continue working.

One alert per active threat

enSilo only warns you after it has prevented malicious outbound communication, data manipulation or unauthorized encryption.

„Chief Information Security Officers and other IT security decision makers
new security technology vendors should consider using the
support a secure digital workplace.“
Gartner, Cool Vendor 2016