Component
Compliance
Anti-Malware
Media Encryption
and Media
Encryption & Port
Protection
Firewall and
Application Control
Full Disk Encryption
Remote Access
VPN
Description
Allows you to enforce endpoint compliance on multiple checks
before users log into the network. You can check that the:
n
appropriate endpoint security components are installed
n
correct OS service pack are installed on the endpoint
n
only approved applications are able to run on the endpoint
appropriate anti-malware product and version is running on
n
the endpoint.
Protects clients from known and unknown viruses, worms, Trojan
horses, adware, and keystroke loggers.
Protects data stored on the computers by encrypting removable
media devices and allowing tight control over computers' ports
(USB, Bluetooth, and so on).
Defines the topology of the organizational network, separating it into
Trusted and Internet domains.
Blocks or allows network traffic based on attributes of network
connections.
Controls network access on a per-application basis, letting you
restrict application access by zone and direction.
Combines Pre-boot protection, boot authentication, and strong
encryption to make sure that only authorized users are given access
to information stored on desktops and laptops.
Manages:
n
How a Full Disk Encryption user logs in to the computer
n
How failed logins are handled
n
Password security
n
Access to remote help
Provide secure, seamless access to corporate networks remotely,
over IPsec VPN.
R81 Harmony Endpoint Server Administration Guide | 20
Introduction to Endpoint Security
Need help?
Do you have a question about the HARMONY R81 and is the answer not in the manual?