Protector Endpoint Protection
Intelligently Simple Endpoint Protection
Protector Air is focused on protecting individual sessions and the transactions within those sessions. Protector Endpoint further protects internal and external endpoints by actively disabling the keylogging and data-stealing capabilities of malware, preventing the theft of critical corporate or user credentials and other sensitive information that is used by cyber criminals to commit fraud or gain privileged access to the corporate network.
The Protector Endpoint Approach
Protector Endpoint was designed to provide a solution focused on defeating crimeware attacks. Crimeware has become so sophisticated that traditional detect-and-remove strategies of anti-virus are no longer a viable approach and conventional endpoint protection products are often clunky and hard to manage. Instead of attempting to detect and remove crimeware, Protector Endpoint disables crimeware functions to eliminate its ability to collect information. Without browser-entered data, cyber criminals are unable to perpetrate crime.
How it works
The lightweight Protector Endpoint application is installed on Windows-based PCs to support all common browsers (Chrome, Firefox, IE, Opera, and Safari) and has no software or hardware requirements. Protector Endpoint detects browsers and begins protecting immediately after installation, requiring no configuration or user interaction.
Detecting crimeware presence on an endpoint is a losing battle. Instead, Protector Endpoint blocks the limited set of techniques crimeware uses to access sensitive data. Because of this unique approach, criminals never obtain the user-entered data they need to commit fraud and organizations can defend against those attacks responsible for the overwhelming majority of financial losses. Protector Endpoint simple to install and was designed to minimize any impact or disruption of users.