{{ getCount}}
CONTACT US
{{ product.title }} +

{{ msg}}

Endpoint Protection

Endpoint protection provides security beyond the capabilities of classic antivirus solutions. Effective endpoint protection helps shield your corporate environment when the network is accessed from remote locations by means of wireless or mobile devices such as laptops, tablets and mobile phones.

Virus protection

Computer viruses are created in a way that they can multiply unnoticed and then infect or compromise as many devices and files as possible. Ensuring protection against them is rendered rather difficult by the fact that they have increasingly advanced intelligence; for example, they are able to change their own code or activity.

Invitech provides real-time protection supported by cloud technology not only against viruses but also spyware, rootkits, unwanted adware and other malware spreading on the Internet, while operating almost unnoticed by you. With its proactive protection system, the search engine also provides effective protection against the latest attacks without disturbing you with false alarms or slowing down your computers.

Our service with monthly billing provides complex protection for users of the system. Incoming suspicious contents, whether viral or spam, are made accessible to the user only after prior approval by the system.

The system performs its controlling function by several interrelated means. If the content does not comply with the pre-defined security policy at one of the levels, it will be quarantined.

Next generation antivirus module
A component to complement any previously installed antivirus software: 

  • Detection of malware that attempts to benefit from software vulnerabilities (exploit prevention)
  • Component to detect ransomware (with the capacity to recover encrypted data)
  • Whitelisting of applications (application lockdown)
  • AI-based technology (deep learning technology)
  • Visualisation of attempted attacks and their causes (root cause analysis)
  • Single central interface
  • Collaboration with a firewall (automatic separation of infected machines on the network) 

Business benefits

  • Control – protecting user data from unauthorised access and efficiently controlling the applications running on the device
  • Reporting – Monitoring reports with the findings related to the work of users, creation of the model of typical use
  • Increased IT security
  • Increased IT security
  • Guaranteed access to corporate resources and flexible adaptability in an automatised and secure fashion

Select a product and ask for our quotation!

Mobile Device Management (MDM)

With the rapid penetration of mobile devices and the popularity of the BYOD (Bring Your Own Device) strategy, the means of guaranteeing the safe use of employees’ mobile devices are becoming the focus of attention. These days it is expected that mobile devices enable users to connect to the company’s network, thereby gaining access to sensitive information.

Mobile Device Management (MDM) encrypts and hides mobile devices and the data stored by them in the event of unauthorised access.

MDM may cover one or more applications or mobile devices. The multilevel protection provides highly customisable solutions to support efficient central operation.

The system is suitable for any pre-defined task of managing the elements of the system (mobile device access), from basic controls to complex ones (e.g. Android /iPhone versions, availability of applications, patch level control, access control). In case of theft the system is able to delete confidential data stored in the system, as well as directly prevent multi-level access.

Business benefits

  • Control – Protection of user data by preventing unauthorised access and by effectively controlling applications running on the device
  • Reporting – Monitoring reports with the findings related to the work of users, creation of a model of typical use
  • Increased IT security
  • Efficient application management – for example, spreading becomes possible
  • Reduced number of device faults
  • Maintaining mobility by proper control
  • Multilevel protection against data theft
  • Guaranteeing access to corporate resources and flexible adaptability in an automatised and secure fashion
  • Efficient application management

Invitech’s offer

Business processes are made complicated by the interconnected mobile and IoT devices that need to be managed. Using SOTI MobiControl you may safely perform your mobile installation tasks without having to consider the manufacturers or operating systems of the devices involved.

Select a product and ask for our quotation!

Endpoint protection

Encryption

Data protection is a key issue for every company as unauthorised access represents serious risks. Most employees use laptops and often store confidential company information on them. The number of lost and stolen devices is growing year by year and passwords alone do not provide sufficient protection. To keep sensitive business information secure, the computer’s hard drive needs to be encrypted. Invitech uses full disk encryption (Windows BitLocker and MacFileVault) offering comprehensive data protection. In addition, individual files are encrypted and remain encrypted during sharing, copying (USB, shared directory) or uploading to the cloud. Users may easily encrypt, decrypt and access information by means of automatic processes. Users may open, edit and even share encrypted files within the company as they would otherwise, so productivity is not hindered in any way. A single click is all that is needed to share files externally, decrypt or encrypt them, or create password protection. Encryption policies and keys are easily managed on a web-based, centralised interface.

Security management platform

The platform allows you to manage and monitor encryption, individual endpoints and other security services used by the company, cloud-based or on-site alike, from one place. Using our synchronised platform the information seen by different security solutions is shared and user security policies may be uniformly managed. The detailed reports and the summary dashboard as well as automatically prioritised notifications provide insight into the security status.

Business benefits

  • Real-time, proactive protection
  • Protecting data on lost devices
  • Encryption on all platforms (hard drive, USB, cloud, etc.)
  • Extensive encryption for several types of devices (Windows, Mac, iOS, Android)
  • Also available with monthly rates
  • Quick to install
  • Centralised console for easy operation
  • Personalised dashboards, scheduled reports

Invitech’s offer

Invitech uses full disk encryption (Windows BitLocker and MacFileVault) offering comprehensive data protection.
In addition, individual files are encrypted and remain encrypted during sharing, copying (USB, shared directory) or uploading to the cloud.
 

Select a product and ask for our quotation!

Back to Services page.

Széchenyi logo