Cisco Anyconnect ISE Posture Windows Support Charts for Compliance Module V3.6.11428.2

Total Page:16

File Type:pdf, Size:1020Kb

Cisco Anyconnect ISE Posture Windows Support Charts for Compliance Module V3.6.11428.2 Cisco AnyConnect ISE Posture Windows Support Charts for Compliance Module v3.6.11428.2 August 2, 2017 © 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco public. Page 1 of 65 Contents Anti-Virus .................................................................................................................................................................................... 3 Anti-Spyware ............................................................................................................................................................................ 43 Patch Management................................................................................................................................................................... 59 Disk Encryption ........................................................................................................................................................................ 61 ©2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 65 This document lists the Windows OS anti-virus, anti-spyware, patch management, and disk encryption products that are supported by the ISE Posture Agent. The Windows compliance modules are version 3.6.11428.2. Anti-Virus Definition State Product Name Product Version Live Update Min. Compliance Module Version Check 360Safe.com 360 Antivirus 1.x yes yes 3.4.16.1 360 Antivirus 3.x yes - 3.5.5767.2 360 Total Security 4.x yes - 3.6.9335.2 360 Total Security 5.x yes - 3.6.9872.2 360 Total Security 6.x yes - 3.6.9908.2 360 Total Security 7.x yes - 3.6.10231.2 360 Total Security 8.x yes - 3.6.10547.2 360天擎 6.x - - 3.6.11017.2 360杀毒 1.x yes - 3.4.13.1 360杀毒 2.x yes - 3.4.25.1 360杀毒 3.x - - 3.5.2101.2 360杀毒 4.x - - 3.5.6528.2 360杀毒 5.x yes - 3.6.8769.2 Other 360Safe.com Antivirus x - - 3.5.2101.2 AEC, spol. s r.o. Other AEC, spol. s r.o. Antivirus x - - 3.5.2101.2 TrustPort Antivirus 2.x - yes 3.4.8.1 Agnitum Ltd. Other Agnitum Ltd. Antivirus x - - 3.5.2101.2 Outpost Antivirus Pro 2009 6.x yes yes 3.4.8.1 Outpost Antivirus Pro 7.x yes yes 3.4.21.1 Outpost Antivirus Pro 8.x yes yes 3.5.6528.2 Outpost Antivirus Pro 9.x yes yes 3.6.9610.2 Outpost Security Suite Free 7.x - - 3.5.4746.2 Outpost Security Suite Pro 7.x yes yes 3.4.21.1 Outpost Security Suite Pro 8.x yes yes 3.5.7011.2 Outpost Security Suite Pro 9.x yes yes 3.6.9457.2 AhnLab, Inc. AhnLab Security Pack 2.x yes yes 3.4.8.1 AhnLab V3 Endpoint Security 9.x yes yes 3.6.10910.2 AhnLab V3 Internet Security 2007 7.x yes yes 3.4.8.1 Platinum AhnLab V3 Internet Security 2007 7.x yes yes 3.4.8.1 AhnLab V3 Internet Security 2008 7.x yes yes 3.4.8.1 Platinum AhnLab V3 Internet Security 2009 7.x yes yes 3.4.13.1 Platinum ©2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 65 Definition State Product Name Product Version Live Update Min. Compliance Module Version Check AhnLab V3 Internet Security 7.0 Platinum 7.x yes yes 3.4.8.1 Enterprise AhnLab V3 Internet Security 8.0 8.x yes yes 3.4.8.1 AhnLab V3 Internet Security 9.0 9.x yes yes 3.6.8323.2 AhnLab V3 VirusBlock Internet Security 7.x yes - 3.4.8.1 2007 Platinum Enterprise AhnLab V3 VirusBlock Internet Security 7.x yes yes 3.4.8.1 2007 Other AhnLab, Inc. Antivirus x - - 3.5.2101.2 V3 Click 1.x yes - 3.5.6317.2 V3 Lite 1.x yes yes 3.4.13.1 V3 Lite 3.x yes - 3.6.7873.2 V3 VirusBlock 2005 6.x yes - 3.4.8.1 V3 ウイルスブロック NA yes yes 3.4.8.1 V3Pro 2004 6.x yes yes 3.4.8.1 Aliant Aliant Business Security Suite Anti-Virus 6.x yes yes 3.4.8.1 Aliant Business Security Suite Anti-Virus 7.x yes - 3.4.8.1 Aliant Security Services Anti-Virus 7.x yes - 3.4.8.1 Gestionnaire de sécurité Affaires d'Aliant 6.x yes yes 3.4.8.1 Anti-Virus Gestionnaire de sécurité Affaires d'Aliant 7.x yes - 3.4.8.1 Antivirus Gestionnaire de sécurité d'Aliant Antivirus 7.x yes - 3.4.8.1 Other Aliant Antivirus x - - 3.5.2101.2 ALLIT Service, LLC. Other ALLIT Service, LLC. Antivirus x - - 3.5.2101.2 Zillya Antivirus 1.x yes - 3.5.1427.2 Zillya Internet Security 1.x yes - 3.5.1427.2 ALWIL Software avast! Antivirus (managed) 4.x yes yes 3.4.8.1 avast! Antivirus Professional 4.8.x yes yes 3.4.8.1 avast! Antivirus Professional 4.x yes yes 3.4.8.1 avast! Antivirus 4.8.x yes yes 3.4.8.1 avast! Antivirus 4.x yes yes 3.4.8.1 avast! Business Protection Plus 6.x yes yes 3.5.526.2 avast! Business Protection 6.x yes yes 3.5.526.2 avast! Business Security 10.x yes yes 3.6.10120.2 avast! Business Security 12.x yes yes 3.6.10970.2 avast! Endpoint Protection Plus 7.x yes yes 3.5.2101.2 avast! Endpoint Protection Plus 8.x yes yes 3.5.7336.2 avast! Endpoint Protection Suite Plus 7.x yes yes 3.5.2101.2 avast! Endpoint Protection Suite Plus 8.x yes yes 3.5.7336.2 avast! Endpoint Protection Suite 7.x yes yes 3.5.2101.2 ©2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 65 Definition State Product Name Product Version Live Update Min. Compliance Module Version Check avast! Endpoint Protection Suite 8.x yes yes 3.5.7336.2 avast! Endpoint Protection 7.x yes yes 3.5.2101.2 avast! Endpoint Protection 8.x yes yes 3.5.7336.2 avast! File Server Security 7.x yes yes 3.5.2461.2 avast! Free Antivirus 11.x yes yes 3.6.10363.2 avast! Free Antivirus 12.x yes yes 3.6.10740.2 avast! Free Antivirus 17.x yes yes 3.6.11199.2 avast! Free Antivirus 2014.x yes - 3.6.8501.2 avast! Free Antivirus 2015.x yes yes 3.6.9759.2 avast! Free Antivirus 5.x yes yes 3.4.8.1 avast! Free Antivirus 6.x yes yes 3.4.25.1 avast! Free Antivirus 7.x yes yes 3.5.771.2 avast! Free Antivirus 8.x yes yes 3.5.5980.2 avast! Free Antivirus 9.x yes - 3.6.8194.2 avast! Internet Security 10.x yes yes 3.6.9845.2 avast! Internet Security 11.x yes yes 3.6.10294.2 avast! Internet Security 12.x yes yes 3.6.10740.2 avast! Internet Security 17.x yes yes 3.6.11295.2 avast! Internet Security 5.x yes yes 3.4.13.1 avast! Internet Security 6.x yes yes 3.4.25.1 avast! Internet Security 7.x yes yes 3.5.771.2 avast! Internet Security 8.x yes yes 3.5.6317.2 avast! Internet Security 9.x yes yes 3.6.8194.2 avast! Premier 10.x yes yes 3.6.9759.2 avast! Premier 11.x yes yes 3.6.10547.2 avast! Premier 8.x yes yes 3.5.6317.2 avast! Premier 9.x yes yes 3.6.8323.2 avast! Pro Antivirus 10.x yes yes 3.6.9845.2 avast! Pro Antivirus 11.x yes yes 3.6.10482.2 avast! Pro Antivirus 12.x yes yes 3.6.11098.2 avast! Pro Antivirus 17.x yes yes 3.6.11130.2 avast! Pro Antivirus 5.x yes yes 3.4.16.1 avast! Pro Antivirus 6.x yes yes 3.4.25.1 avast! Pro Antivirus 7.x yes yes 3.5.1427.2 avast! Pro Antivirus 8.x yes yes 3.5.6317.2 avast! Pro Antivirus 9.x yes yes 3.6.8194.2 avast! Server Edition 4.x yes yes 3.4.8.1 Other ALWIL Software Antivirus x - - 3.5.2101.2 America Online, Inc. Active Virus Shield 6.x yes yes 3.4.8.1 AOL Safety and Security Center Virus 1.x yes - 3.4.8.1 Protection ©2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 65 Definition State Product Name Product Version Live Update Min. Compliance Module Version Check AOL Safety and Security Center Virus 102.x yes - 3.4.8.1 Protection AOL Safety and Security Center Virus 2.x yes - 3.4.8.1 Protection AOL Safety and Security Center Virus 210.x yes - 3.4.8.1 Protection Other America Online, Inc. Antivirus x - - 3.5.2101.2 Antiy Labs Antiy Ghostbusters 6.x - yes 3.4.13.1 Other Antiy Labs Antivirus x - - 3.5.2101.2 Anvisoft Corporation Anvisoft Smart Defender 1.x - - 3.6.7873.2 ArcaBit Arcabit Endpoint AntiVirus 2014.x - - 3.6.9335.2 Arcabit Endpoint Security 2014.x - - 3.6.9335.2 ArcaVir Antivirus 11.x - - 3.5.3084.2 ArcaVir Antivirus 12.x - yes 3.5.3084.2 ArcaVir Antivirus 2014.x - - 3.6.9335.2 ArcaVir Internet Security 11.x - yes 3.5.3084.2 ArcaVir Internet Security 12.x - yes 3.5.3084.2 ArcaVir Internet Security 2014.x - - 3.6.9335.2 Other ArcaBit Antivirus x - - 3.5.3084.2 Ashampoo GmbH & Co. KG Ashampoo Anti-Malware 1.x yes yes 3.5.1549.2 Other Ashampoo GmbH & Co. KG x - - 3.5.2101.2 Antivirus AT&T AT&T Internet Security Suite AT&T Anti- 6.x yes yes 3.4.8.1 Virus Other AT&T Antivirus x - - 3.5.2101.2 Auslogics Software Pty Ltd Auslogics Antivirus 15.x - - 3.5.5767.2 Authentium, Inc.
Recommended publications
  • Business Softwares & Solutions
    +91-8048372570 Business Softwares & Solutions https://www.indiamart.com/business-softwares/ A software solutions company working on Information Security , Web Security , Data Security , Communication, Collaboration , Business Process, Business Consulting , Invoice Application About Us Business Softwares & Solutions is a company in software distribution of repute in India. The company is a part of the group of BSS, is in existence for more than 40 year in business of technology distribution. We facilitate distribution of softwares and its marketing, presales, first hand support and implementation in India. Description: We are a software consulting and distribution company, in Kolkata from 1999. Our expertise lies in Security , Network Management , Storage Solution , Web Services and Consulting . Here are some of the product categories mention in the following we work with: COMMUNICATION SOFTWARE: Axigen Mail Server , Active Experts SMS Server, Bulk Mail and SMS. COLLABORATION : Bitrix24 SECURITY SOFTWARE: Kaspersky , Eset ,Avast, Hexamail. NETWORK MANAGEMENT SOFTWARE: Solarwinds , ISL ONLINE REMOTE CONTROL , Dameware. STORAGE SOLUTIONS & SOFTWARES: Acronis , Farstone, GoodSync, SyncBack , Lenovo. OUR NATIONAL PARTNERS : The business operation consist of direct and channel sales for companies like : Axigen Mail Server , ISL Online , Bitrix24 Collaboration CRM , PROJECT MANAGEMENT , BUSINESS PROCESS MANAGEMENT Kaspersky Lab, Dameware LLC, Activexperts, Hexamail, Solarwind, Deerfield, Avast Anti Virus , Sucuri Security For more information,
    [Show full text]
  • Hostscan 4.8.01064 Antimalware and Firewall Support Charts
    HostScan 4.8.01064 Antimalware and Firewall Support Charts 10/1/19 © 2019 Cisco and/or its affiliates. All rights reserved. This document is Cisco public. Page 1 of 76 Contents HostScan Version 4.8.01064 Antimalware and Firewall Support Charts ............................................................................... 3 Antimalware and Firewall Attributes Supported by HostScan .................................................................................................. 3 OPSWAT Version Information ................................................................................................................................................. 5 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.890.0 for Windows .................................................. 5 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.890.0 for Windows ........................................................ 44 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.824.0 for macos .................................................... 65 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.824.0 for macOS ........................................................... 71 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.730.0 for Linux ...................................................... 73 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.730.0 for Linux .............................................................. 76 ©201 9 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
    [Show full text]
  • Security Survey 2014
    Security Survey 2014 www.av-comparatives.org IT Security Survey 2014 Language: English Last Revision: 28th February 2014 www.av-comparatives.org - 1 - Security Survey 2014 www.av-comparatives.org Overview Use of the Internet by home and business users continues to grow in all parts of the world. How users access the Internet is changing, though. There has been increased usage of smartphones by users to access the Internet. The tablet market has taken off as well. This has resulted in a drop in desktop and laptop sales. With respect to attacks by cyber criminals, this means that their focus has evolved. This is our fourth1 annual survey of computer users worldwide. Its focus is which security products (free and paid) are employed by users, OS usage, and browser usage. We also asked respondents to rank what they are looking for in their security solution. Survey methodology Report results are based on an Internet survey run by AV-Comparatives between 17th December 2013 and 17th January 2014. A total of 5,845 computer users from around the world anonymously answered the questions on the subject of computers and security. Key Results Among respondents, the three most important aspects of a security protection product were (1) Low impact on system performance (2) Good detection rate (3) Good malware removal and cleaning capabilities. These were the only criteria with over 60% response rate. Europe, North America and Central/South America were similar in terms of which products they used, with Avast topping the list. The share of Android as the mobile OS increased from 51% to 70%, while Symbian dropped from 21% to 5%.
    [Show full text]
  • Test: Zehn Kostenlose Antiviren-Tools
    TEST & KAUFBERATUNG ANTIVIREN-TOOLS Test: Zehn kostenlose Antiviren-Tools Welches kostenlose Antivirenprogramm schützt den PC am wirkungsvollsten? Reicht ein Gratis-Scanner aus,oder ist der Rechner nur mit Kaufsoftware sicher? m Testlabor stürzten sich diesmal rund eine Die kostenlose Software von Panda setzt Vergleich: Gratis- und Kaufsoftware I halbe Million PC-Schädlinge auf kostenlose komplett auf die neue Cloud-Technologie. Das Antivirenprogramme. In Zusammenarbeit mit heisst: Es befinden sich fast keine Virensigna- Schützen kommerzielle Sicherheitspakete wie dem Testlabor AV-Test-org wurde die turen auf der Festplatte des Anwenders. Alle Kaspersky Internet Security 2010 und Gdata Leistung beim Erkennen und Entfernen von Scans und Prüfungen erledigt das Programm Internet Security 2010 besser gegen Viren und Viren, Würmern, Bots, Trojanern, Adware und mit Hilfe eines Servers im Internet. Trojaner als die besten Gratis-Scanner? Spyware geprüft. Zudem wurden die Ausser Microsoft Security Essentials besitzt Häufigkeit der Updates gemessen und die jedes der getesteten Programme eine deutsche Security-Suiten wie Kaspersky Internet Security 2010 Geschwindigkeit, mit der die Software auf Bedienoberfläche. für 65 Franken und Gdata Internet Security 2010 für neue Schädlinge reagierte. Bewertet wurde Die kostenlosen Antiviren-Tools von Emsi 45 Franken haben mehr Funktionen als kostenlose auch die heuristische Suche mit Signaturen, Software, Bitdefender und Clamwin haben Antiviren-Tools,etwa Firewall oder Multicore-CPU- die eine Woche und zwei
    [Show full text]
  • A Glance Into the Eye Pyramid Technical Article V2
    A glance into the Eye Pyramid RĂZVAN OLTEANU Security Reasercher We keep you safe and we keep it simple. 01 Introduction On January 11, 2017 Italian news agency AGI, published a court order regarding cyber-attacks against high ranking Italian government members and Italian institutions. The attacks were conducted by two Italian brothers to get financial information that would help them gain an advantage when trading on financial markets. Overview The campaign was carried out over several years starting in 2008 and continuing into 2010, 2011, 2012 and 2014. The mechanism the brothers used to distribute their malware was simple; targeted spear-phishing emails aimed at victims who had already been selected. The emails con- tained a malware attachment, which once opened harvested information from the victims’ computers. This information consisted of pictures, documents, archives, presenta- tions, email contacts, email bodies, usernames, passwords, keystrokes, web pages content and databases. Technical details The malware was written in VisualBasic.net and was obfuscated twice using common obfuscators: Dotfuscator and Skater .NET which can be easily reversed. The malware stored its sensitive data – license keys, URLs and paths – by encrypting with the Triple DES algorithm using the MD5 of a provided password as key and SHA256 of the pass- word as initialization vector. A glance into the Eye Pyramid 01 02 Figure 1 Security applications To remain unnoticed, it tried to disable any security application installed on the victim’s computer. Targeted
    [Show full text]
  • Page 1 of 375 6/16/2021 File:///C:/Users/Rtroche
    Page 1 of 375 :: Access Flex Bear High Yield ProFund :: Schedule of Portfolio Investments :: April 30, 2021 (unaudited) Repurchase Agreements(a) (27.5%) Principal Amount Value Repurchase Agreements with various counterparties, 0.00%, dated 4/30/21, due 5/3/21, total to be received $129,000. $ 129,000 $ 129,000 TOTAL REPURCHASE AGREEMENTS (Cost $129,000) 129,000 TOTAL INVESTMENT SECURITIES 129,000 (Cost $129,000) - 27.5% Net other assets (liabilities) - 72.5% 340,579 NET ASSETS - (100.0%) $ 469,579 (a) The ProFund invests in Repurchase Agreements jointly with other funds in the Trust. See "Repurchase Agreements" in the Appendix to view the details of each individual agreement and counterparty as well as a description of the securities subject to repurchase. Futures Contracts Sold Number Value and Unrealized of Expiration Appreciation/ Contracts Date Notional Amount (Depreciation) 5-Year U.S. Treasury Note Futures Contracts 3 7/1/21 $ (371,977) $ 2,973 Centrally Cleared Swap Agreements Credit Default Swap Agreements - Buy Protection (1) Implied Credit Spread at Notional Premiums Unrealized Underlying Payment Fixed Deal Maturity April 30, Amount Paid Appreciation/ Variation Instrument Frequency Pay Rate Date 2021(2) (3) Value (Received) (Depreciation) Margin CDX North America High Yield Index Swap Agreement; Series 36 Daily 5 .00% 6/20/26 2.89% $ 450,000 $ (44,254) $ (38,009) $ (6,245) $ 689 (1) When a credit event occurs as defined under the terms of the swap agreement, the Fund as a buyer of credit protection will either (i) receive from the seller of protection an amount equal to the par value of the defaulted reference entity and deliver the reference entity or (ii) receive a net amount equal to the par value of the defaulted reference entity less its recovery value.
    [Show full text]
  • Acer Lanscope Agent 2.2.25.84 Acer Lanscope Agent 2.2.25.84 X64
    Acer LANScope Agent 2.2.25.84 Acer LANScope Agent 2.2.25.84 x64 Adaptive Security Analyzer 2.0 AEC TrustPort Antivirus 2.8.0.2237 AEC TrustPort Personal Firewall 4.0.0.1305 AhnLab SpyZero 2007 and SmartUpdate AhnLab V3 Internet Security 7.0 Platinum Enterprise AhnLab V3 Internet Security 7.0 Platinum Enterprise x64 ArcaVir Antivir/Internet Security 09.03.3201.9 Ashampoo AntiSpyware 2 v 2.05 Ashampoo AntiVirus AtGuard 3.2 Authentium Command Anti-Malware v 5.0.5 AVG Identity Protection 8.5 BitDefender Antivirus 2008 BitDefender Antivirus Plus 10.247 BitDefender Client Professional Plus 8.0.2 BitDefender Antivirus Plus 10 BitDefender Standard Edition 7.2 (Fr) Bit Defender Professional Edition 7.2 (Fr) BitDefender 8 Professional Plus BitDefender 8 Professional (Fr) BitDefender 8 Standard BitDefender 8 Standard (Fr) BitDefender 9 Professional Plus BitDefender 9 Standard BitDefender for FileServers 2.1.11 BitDefender Free Edition 2009 12.0.12.0 BitDefender Antivirus 2009 12.0.10 BitDefender 2009 12.0.11.5 BitDefender Internet Security 2008 BitDefender Internet Security 2009 12.0.8 BitDefender 2009 Internet Security 12.0.11.5 BitDefender Internet Security v10.108 BitDefender Total Security 2008 BitDefender 2009 Total Security 12.0.11.5 CA AntiVirus 2008 CA Anti-Virus r8.1 / CA eTrustITM Agent r8.1 CA eTrustITM 8.1 CA eTrustITM 8.1.00 CA eTrustITM Agent 8.0.403 CA eTrust Pestpatrol 5.0 CA HIPS Managed Client 1.0 CA eTrust Antivirus 7.1.0194 CA PC Security Suite 6.0 \ Private PC Security Suite 6.0 CA PC Security Suite 6.0.00 Cipafilter Client Tools
    [Show full text]
  • Nessus and Antivirus
    Nessus and Antivirus January 31, 2014 (Revision 4) Table of Contents Introduction ......................................................................................................................................... 3 Standards and Conventions........................................................................................................................... 3 Overview .............................................................................................................................................. 3 A Note on SCAP Audits ................................................................................................................................. 4 Microsoft Windows Defender ............................................................................................................. 4 Kaspersky Internet Security 2012 ...................................................................................................... 4 AVG 2012 ............................................................................................................................................. 7 Norton Internet Security 2012 .......................................................................................................... 10 Norton 360 ......................................................................................................................................... 14 Panda Internet Security 2012 ........................................................................................................... 18 Trend Micro Titanium
    [Show full text]
  • Vb100 Comparative Review on Windows Server 2016
    DECEMBER 2016 Covering the global threat landscape VB100 COMPARATIVE REVIEW ON WINDOWS SERVER 2016 INTRODUCTION As is our standard approach for speed and performance measures, baselines were taken with the system in its default It was an all-new platform for this month’s VB100 state, which in this case meant with Defender enabled. The comparative, with our fi rst look at Microsoft’s latest aim of this approach is to enable users to judge how much server-grade operating system variant, Windows Server of an impact each solution has on the speed of a standard 2016. Although the platform was offi cially released only system compared to a basic, unmodifi ed installation. This shortly before the test got under way, previews had been time, however, we quickly noticed something of a problem available for some time, and being largely similar to the – almost every product appeared to be running much faster widely deployed desktop equivalent Windows 10, we hoped than the baseline times, with signifi cantly lower resource that security developers would have had plenty of time to usage too. ensure their products supported the new environment to the full. However, any new setup will inevitably bring some The resulting fl ood of negative numbers made our usual surprises, so we were more than usually keen to see just speed graphs rather diffi cult to read, and after some how well products would perform this month. analysis and consideration we eventually decided to break from our standard practice and rebuild the baseline measures using unprotected, bare systems rather than PLATFORM AND TEST SETS the default setup for the chosen platform.
    [Show full text]
  • Blackberry Cylance Cylanceguard Datasheet
    CylanceGUARD™ 24x7 Managed Detection and Response CylanceGUARD is a 24x7 managed detection and response offering that provides Benefits: actionable intelligence for customers to prevent threats quickly, while minimizing alert fatigue without requiring additional resources. Using the same expertise and Discover Threats in No Time methods as the BlackBerry Cylance incident response team, analysts from Cylance or one of our strategic partners, hunt through customer environments to find and • Leverage our native AI platform 24X7 to detect known and zero- contain threats, prevent major breaches and allow organizations to mature their day threats security program. • Receive detailed and actionable threat intelligence whenever BlackBerry Cylance has the strategy, expertise, and technology and wherever to analyze and guard an organization by preventing and Respond to Threats in No Time • Implement effective containing threats as well as large scale breaches. counter-measures quickly • Limit the impact of a breach CylanceGUARD Components Implement in No Time • Your CylanceGUARD subscription includes our award-winning native AI platform onboarded by an expert team of ThreatZERO consultants. Key Features: Transparent, Proactive User Portal Threat Hunting • Automatically validate and triage alerts • Collating forensic data and converting alert noise into threat intelligence Customized Mobile Visibility and Hunting Triage Mobile Interaction • Orchestrate alert notifications and analyst interactions • Defined escalation tiers with an online portal and mobile app Automated, Rapid Response • Respond dynamically to changes in the environment • Assess indicators of compromise Cylance AI Platform and initiate responses Data Science Threat Research Human Expertise CylanceGUARD and CylanceGUARD Advanced both leverage Cylance AI Platform About BlackBerry with the pre-execution abilities of CylancePROTECT® and the post-execution of monitoring and blocking associated with CylanceOPTICS™.
    [Show full text]
  • 2012 Consumer Security Products Performance Benchmarks (Edition 2) Antivirus and Internet Security Windows 7
    2012 Consumer Security Products Performance Benchmarks (Edition 2) Antivirus and Internet Security Windows 7 November 2011 Document: 2012 Consumer Security Products Performance Benchmarks (Edition 2) Authors: M. Baquiran, D. Wren Company: PassMark Software Date: 14 November 2011 Edition: 2 File: antivirus_12-performance-testing-ed2.docx Consumer Internet Security and Antivirus Solutions PassMark Software Table of Contents TABLE OF CONTENTS ......................................................................................................................................... 2 REVISION HISTORY ............................................................................................................................................ 4 REFERENCES ...................................................................................................................................................... 4 EXECUTIVE SUMMARY ...................................................................................................................................... 5 OVERALL SCORE ................................................................................................................................................ 6 PRODUCTS AND VERSIONS ............................................................................................................................... 8 INTERNET SECURITY SOFTWARE .................................................................................................................................. 8 ANTIVIRUS SOFTWARE .............................................................................................................................................
    [Show full text]
  • Overview of Client Management Suite 7.1 Hands-On Lab
    Overview of Client Management Suite 7.1 Hands-On Lab Description If you are new to Altiris Client Management Suite, this lab is an excellent place to start. This introduction lab provides a hands-on overview of the suite going through many steps of IT lifecycle management. It includes the basics on software and patch management, deployment, migration, remote assistance, and more to start you on your path to effective client management. At the end of this lab, • Create an inventory policy and run reports to view the you should be able to collected data • Describe the available methods for delivering and metering software within a real-world environment • Describe the process of staging and deploying patches to systems and applications within a network environment • Use Deployment Solution 7.1 to perform an OS Migration Notes . The lab will be directed and will provide you with step-by- step walkthroughs of key features. Feel free to follow along with the instructor, or you may optionally perform this lab at your own pace. Be sure to ask your instructor any questions you may have. Thank you for coming to our lab session. Introduction Altiris® Client Management Suite™ reduces the total cost of owning client systems by automating time-consuming and redundant tasks. By minimizing the efforts and costs associated with deploying, managing, securing and troubleshooting client systems, organizations can gain control of their environments. This easy-to-use, integrated suite of solution software for Windows, Mac and Linux is designed to address IT management needs for desktop and notebook computers throughout their entire IT lifecycle.
    [Show full text]