Capture Client Premier Datasheet
The ever-growing threat of ransomware and other malicious malware-based attacks has proven that client protection solutions cannot be measured based only on endpoint compliance. Traditional antivirus technology uses a long-embattled signature-based approach, which has failed to match the pace of emerging malware and evasion techniques.
Additionally, with the proliferation of telecommuting, mobility and BYOD, there is a dire need to deliver consistent protection, application vulnerability intelligence, and web policy enforcement and more for endpoints anywhere. SonicWall Capture Client is a unified endpoint offering with multiple EPP and EDR capabilities.
HIGHLIGHTS:
- Get high efficacy, actionable threat detection without the noise
- Centralized and cloud-delivered management with true multi-tenant capabilities to fortify network and endpoint security
- Empower and up-level security and IT teams with an easy-to-use, intuitive solution that stops modern adversaries
FEATURES AND BENEFITS:
Continuous Behavioral Monitoring:
- See complete profiles of file, application, process, and network activity
- Protect against both file-based and fileless malware
- Deliver a 360-degree attack view with actionable intelligence
Threat Hunting With Deep Visibility:
- Utilize Deep Visibility to search for threats based on behavior indicators as well as Indicators of Compromise (IOC) across covered Windows, MacOS, and Linux devices
- Automate Threat Hunting and Response with Custom Rules and Alerts
Capture Advanced Threat Protection (ATP) Integration:
- Automatically upload suspicious files on Windows devices for advanced sandboxing analysis
- Find dormant threats before execution such as malware with built-in timing delays
- Reference Capture ATPs database of file verdicts without the need to upload files to the cloud
Unique Rollback Capabilities:
- Support policies that remove threats completely
- Autonomously restore endpoints to a known good state, before malicious activity initiated
Multiple Layered, Heuristic Based Techniques:
- Leverage cloud intelligence, advanced static analysis and dynamic behavioral protection
- Protect against and remediate known and unknown malware before, during, or after an attack
Application Vulnerability Intelligence:
- Catalog every installed application and any associated risk
- Examine known vulnerabilities with details of the CVEs and severity levels reported
- Use this data to prioritize patching and reduce the attack surface
Endpoint Network Control:
- Add firewall-like controls to the endpoint
- Use an additional quarantine rulebase to handle infected devices
Remote Shell:
- Eliminate the need to have physical contact with devices for troubleshooting, changing local configurations, as well as conducting forensic investigations
No Need For Regular Scans Or Periodic Updates:
- Enable the highest level of protection at all times without hampering user productivity
- Receive a full scan on install and continuously monitors for suspicious activity continually afterward
Optional Integration With SonicWall Firewalls:
- Enable enforcement of deep packet inspection of encrypted traffic (DPI-SSL) on endpoints
- Easily deploy trusted certificates to each endpoint
- Direct unprotected users to a Capture Client download page before accessing the Internet when behind a firewall
Content Filtering:
- Block malicious sites IP addresses, and domains
- Increase user productivity by throttling bandwidth or restricting access to objectionable or unproductive web content
Device Control:
- Block potentially infected devices from connecting to endpoints
- Use granular allow listing policies