SonicWall Capture Client Premier 1000 - 4999 Endpoints (1 Year) 1000 - 4999 Endpoints

SonicWall Capture Client Premier 1000 - 4999 Endpoints (1 Year)

Add to Cart for Price
Manufacturer:SonicWall
Model:02-SSC-9831
Condition:New
Availability:In Stock

SonicWall Capture Client is a unified client platform that delivers multiple Endpoint Detection and Response (EDR) capabilities, including behavior-based malware protection, advanced threat hunting and visibility into application vulnerabilities.
C

Capture Client Premier Datasheet

The ever-growing threat of ransomware and other malicious malware-based attacks has proven that client protection solutions cannot be measured based only on endpoint compliance. Traditional antivirus technology uses a long-embattled signature-based approach, which has failed to match the pace of emerging malware and evasion techniques.

Additionally, with the proliferation of telecommuting, mobility and BYOD, there is a dire need to deliver consistent protection, application vulnerability intelligence, and web policy enforcement and more for endpoints anywhere. SonicWall Capture Client is a unified endpoint offering with multiple EPP and EDR capabilities.

    HIGHLIGHTS:

  • Get high efficacy, actionable threat detection without the noise
  • Centralized and cloud-delivered management with true multi-tenant capabilities to fortify network and endpoint security
  • Empower and up-level security and IT teams with an easy-to-use, intuitive solution that stops modern adversaries

    FEATURES AND BENEFITS:

    Continuous Behavioral Monitoring:

  • See complete profiles of file, application, process, and network activity
  • Protect against both file-based and fileless malware
  • Deliver a 360-degree attack view with actionable intelligence

    Threat Hunting With Deep Visibility:

  • Utilize Deep Visibility to search for threats based on behavior indicators as well as Indicators of Compromise (IOC) across covered Windows, MacOS, and Linux devices
  • Automate Threat Hunting and Response with Custom Rules and Alerts

    Capture Advanced Threat Protection (ATP) Integration:

  • Automatically upload suspicious files on Windows devices for advanced sandboxing analysis
  • Find dormant threats before execution such as malware with built-in timing delays
  • Reference Capture ATPs database of file verdicts without the need to upload files to the cloud

    Unique Rollback Capabilities:

  • Support policies that remove threats completely
  • Autonomously restore endpoints to a known good state, before malicious activity initiated

    Multiple Layered, Heuristic Based Techniques:

  • Leverage cloud intelligence, advanced static analysis and dynamic behavioral protection
  • Protect against and remediate known and unknown malware before, during, or after an attack

    Application Vulnerability Intelligence:

  • Catalog every installed application and any associated risk
  • Examine known vulnerabilities with details of the CVEs and severity levels reported
  • Use this data to prioritize patching and reduce the attack surface

    Endpoint Network Control:

  • Add firewall-like controls to the endpoint
  • Use an additional quarantine rulebase to handle infected devices

    Remote Shell:

  • Eliminate the need to have physical contact with devices for troubleshooting, changing local configurations, as well as conducting forensic investigations

    No Need For Regular Scans Or Periodic Updates:

  • Enable the highest level of protection at all times without hampering user productivity
  • Receive a full scan on install and continuously monitors for suspicious activity continually afterward

    Optional Integration With SonicWall Firewalls:

  • Enable enforcement of deep packet inspection of encrypted traffic (DPI-SSL) on endpoints
  • Easily deploy trusted certificates to each endpoint
  • Direct unprotected users to a Capture Client download page before accessing the Internet when behind a firewall

    Content Filtering:

  • Block malicious sites IP addresses, and domains
  • Increase user productivity by throttling bandwidth or restricting access to objectionable or unproductive web content

    Device Control:

  • Block potentially infected devices from connecting to endpoints
  • Use granular allow listing policies