<rp id="8drvb"></rp>
    <rp id="8drvb"><ruby id="8drvb"></ruby></rp>
    <th id="8drvb"><track id="8drvb"><sup id="8drvb"></sup></track></th>
  1. <tbody id="8drvb"></tbody>
    <th id="8drvb"><track id="8drvb"><rt id="8drvb"></rt></track></th>

    Compare Our Products

    GravityZone is a business solution that can be installed locally or hosted by Bitdefender. Multi-layered protection with proven machine learning, advanced heuristics, anti-ransomware, powerful anti-exploit, signatures, Firewall and Device Control are included in each of the options below.

    SMALL BUSINESS SECURITY SUITE

    Ideal for businesses looking for powerfully simple security

     
    - 60%

    GravityZone
    Elite

    Recommended to companies looking for aggressive protection against sophisticated threats

    - 50%

    GravityZone Advanced Business Security

    Recommended to midsized companies looking for comprehensive protection

    - 50%

    GravityZone Business Security

    Ideal for small businesses looking for simple, yet efficient security

    MANAGEMENT OPTIONS

    On premises / Cloud
    On premises / Cloud
    On premises / Cloud

    TYPES OF ENDPOINTS PROTECTED

    Consistent, next-gen defenses across any type of endpoints

     
     
     

    Physical and Virtual Workstations and Servers

    State of the art security for end-user devices.

    Server Security with Smart Cetralized Scanning (VDI, DaaS) - on-premises or in the cloud. (Also available by CPU socket licensing.)

    Pro-VM, Pro-Cloud defenses with Smart Centralized Scanning for high performance and optimum user experience.

     

    Mobile Devices

    Device and platform agnostic mobile security.

    (On-Premises Console Only)
    (On-Premises Console Only)
     

    Microsoft? Exchange

    Unrivalled defense against malware, spam and phishing attempts.

     

    IoT Devices

    Agentless defenses that can detect threats for IIoT, IoMTs and other types of IoTs.

    Available with the NTSA product
    Available with the NTSA product
    Available with the NTSA product

    TECHNOLOGIES

     
     
     

    Endpoint Risk Analytics

    Assesses, prioritizes and hardens endpoint security misconfigurations and settings with an easy-to-understand prioritized list.

    (Cloud Console Only)
    (Cloud Console Only)
    (Cloud Console Only)

    Web Threat Protection

    Scans incoming web traffic, including SSL, HHTP and HTTPS traffic, to prevent the download of malware to the endpoint. Automatically blocks phishing and fraudulent web pages. Displays search ratings signaling trusted and untrusted pages.

    Device Control

    Threats are often introduced into the company via removable devices. Choose which devices to allow to run, and decide what will be blocked or scanned automatically.

    Application Blacklisting

    Enables full visibility and control of running applications by blacklisting unwanted software. Helps limit the risk of malicious code running undetected.

    Application Control (Whitelisting)

    Provides full visibility and control of applications installed or running on company endpoints, and prevents the execution of any application not allowed by policy.

    (On-Premises Console Only)
     
     

    Firewall

    Fully-featured two-way firewall that controls applications' access to the network and to the Internet. Furthermore, the firewall can protect the system against port scans, restrict ICS and warn when new nodes join a Wi-Fi connection

    Sandbox Analyzer

    Sends suspicious files for detonation, analyzes and provides a verdict in real time. Detects zero-day and targeted attacks; Prevents real time attack prevention with auto-submit; Analyzes once enterprise-wide block.

     
     

    HyperDetect? (Tunable Machine Learning)

    Tunable machine learning layer, detects sophisticated threats. Blocks hacking tools, fileless attacks, zero-day malware and more.

     
     

    Smart Centralized Scanning

    Allows up to 30% more virtual machines than traditional solutions by optimizing and centralizing scan tasks.

     

    Local and Cloud Machine Learning

    Predictive detection of unknown malware; Dynamic file analysis trained on billions of samples; Local machine learning trained on 80,000 malware features.Threat intelligence from over 500 million endpoints globally.

    Advanced Anti-Exploit

    Focuses on attack tools and techniques to detect both known and zero-day exploits that target popular software applications.

    Process Inspector

    Behavior-based real time detection; Monitors all processes running in the operating system and if the process is deemed malicious, will terminate it.Formerly known as Advanced Threat Control (ATC).

    Ransomware Mitigation

    Creates a real-time back-up of the files before being modified by the suspicious process to mitigate the risk of loosing data during advanced ransomware attacks.

    (On-Premises Console Only)

    Automatic Disinfection and Removal

    Automatically blocks confirmed threats through a set of predefined rules, including process termination, moving to quarantine or access blocking.

    Fileless Attacks Defense

    Protects against attacks that attempt to write changes directly in memory.

     

    Network Attack Defense

    Protects against threats that use network vulnerabilities.

    EXTEND SECURITY WITH COMPATIBLE PRODUCTS

     
     
     

    AVAILABLE ADD ONS

     
     
     

    Email Security

    For all email clients, including Office 365

    available
    available
    available

    Patch Management

    Keeps OSes and applications up to date across the entire Windows install base

    available
    available
    available

    Full Disk Encryption

    Protects data for the entire endpoint hard drive by leveraging the encryption mechanisms provided by Windows (BitLocker) and macOS (FileVault).

    available
    available
    available

    Security for AWS

    Built for virtualization, offers flexible pricing, and scales to your size and needs for optimal return on investment

    available
    available
    available

    COMPATIBLE PRODUCTS

     
     
     

    Hypervisor Introspection

    Protects business sensitive data before they are exposed, by detecting and stopping in real-time the cyber attacks at the hypervisor level

    compatible (On-Premises Console Only)
    compatible (On-Premises Console Only)
     

    Security for Storage

    Complete security solutions for data storage protection for enterprise ICAP-compatible file-sharing and network storage systems

    compatible
    compatible (On-Premises Console Only)
     

    Network Traffic Security Analytics

    Cloud threat intelligence, machine learning and behavior analytics applied to network traffic to detect advanced attacks early and enable effective threat hunting

    compatible
    compatible
    compatible

    AVAILABLE SERVICES

     
     
     

    Professional Services

    Empower your organization with optimal security configuration, protection and tailored services.

    available
    available
    available

    Premium Support

    Choose the Silver ,Gold or Platinum Premium Enterprise Support packages, depending on the response times and the types of proactive services necessary for your organization.

    available
    available
    available

    Advanced Threat Intelligence

    Collects data from sensors across the globe - correlate hundreds of thousands of Indicators of Compromise and turn data into actionable, real-time insights.

    available
    available
    available

    Details

    Covers desktops, servers and Exchange mailboxes. No more than 35% of licenses can be used on servers.
    Covers desktops, servers and Exchange mailboxes. No more than 35% of licenses can be used on servers.
    Covers servers and desktops. Servers should account for less than 30% of total units

    MEDIUM AND LARGE BUSINESS SECURITY SUITE

    Ideal for Medium Businesses and Large Enterprise with comprehensive, advance security needs and strict compliance requirements

     

    GravityZone Ultra/
    Ultra Plus

    Recommended to companies looking for an integrated next-gen endpoint protection and EDR platform that accurately protects against sophisticated cyber threats.

    - 60%

    GravityZone
    Elite

    Recommended to companies looking for a single platform that integrates prevention, hardening, and risks & incidents analytics.

    GravityZone Enteprise Licensing (à la carte)

    Recommended for companies looking for integrated security with maximum licensing flexibility.

    MANAGEMENT OPTIONS

    On premises / Cloud
    On premises / Cloud
    On premises

    TYPES OF ENDPOINTS PROTECTED

    Consistent, next-gen defenses across any type of endpoints

     
     
     

    Physical and Virtual Workstations and Servers

    State of the art security for end-user devices.

    Server Security with Smart Cetralized Scanning (VDI, DaaS) - on-premises or in the cloud. (Also available by CPU socket licensing.)

    Pro-VM, Pro-Cloud defenses with Smart Centralized Scanning for high performance and optimum user experience.

    Mobile Devices

    Device and platform agnostic mobile security.

    (On-Premises Console Only)
    (On-Premises Console Only)

    Microsoft? Exchange

    Unrivalled defense against malware, spam and phishing attempts.

    IoT Devices

    Agentless defenses that can detect threats for IIoT, IoMTs and other types of IoTs.

    Included in Ultra Plus Available with the NTSA product
    Available with the NTSA product
    Available with the NTSA product

    SECURITY TECHNOLOGIES

     
     
     

    PREVENTION MODULES

     
     
     

    Local and Cloud Machine Learning

    Predictive detection of unknown malware; Dynamic file analysis trained on billions of samples; Local machine learning trained on 80,000 malware features.Threat intelligence from over 500 million endpoints globally.

    Advanced Anti-Exploit

    Focuses on attack tools and techniques to detect both known and zero-day exploits that target popular software applications.

    Automatic Disinfection and Removal

    Automatically blocks confirmed threats through a set of predefined rules, including process termination, moving to quarantine or access blocking.

    Fileless Attacks Defense

    Protects against attacks that attempt to write changes directly in memory.

    Network Attack Defense

    Protects against attacks that attempt to write changes directly in memory.

    HyperDetect? (Tunable Machine Learning)

    Tunable machine learning layer, detects sophisticated threats. Blocks hacking tools, fileless attacks, zero-day malware and more.

    add-on

    Sandbox Analyzer

    Sends suspicious files for detonation, analyzes and provides a verdict in real time. Detects zero-day & targeted attacks; Real time attack prevention with auto-submit; Analyzes once enterprise-wide block.

    add-on

    DETECTION AND RESPONSE MODULES

     
     
     

    Process Inspector

    Behavior-based real time detection; Monitors all processes running in the operating system and if the process is deemed malicious, will terminate it. Formerly known as Advanced Threat Control (ATC).

    Ransomware Mitigation

    Creates a real-time backup of the files before being modified by the suspicious process to mitigate the risk of loosing data during advanced ransomware attacks.

    (On-Premises Console Only)
    (On-Premises Console Only)

    Incident Visualization

    Easy to understand visual guides highlight critical attack paths, easing burdens on IT staff.

    add-on

    Root Cause Analysis

    Highlights the attack vector, the attack entry point, and how the attack originated. Helps pinpoint the origin node?of?attack, highlighted in the Incident page. The confidence score provides context for security events.

    add-on

    Anomaly Defense

    Baselines system resources to spotlight unusual behavior based on MITRE threat techniques and Bitdefender's own research.

     
    add-on

    MITRE Event Tagging

    MITRE attack techniques and indicators of compromise provide up to the minute insight into named threats and other malware that may be involved.

     
    add-on

    HARDENING AND RISK ANALYTICS MODULES

     
     
     

    Endpoint Risk Analytics

    Assesses, prioritizes and hardens endpoint security misconfigurations and settings with an easy-to-understand prioritized list.

    (Cloud Console Only)
    (Cloud Console Only)
     

    Web Threat Protection

    Scans incoming web traffic, including SSL, HTTP and HTTPSs traffic, to prevent the download of malware to the endpoint. Automatically blocks phishing and fraudulent web pages. Displays search ratings signaling trusted and untrusted pages.

    Device Control

    Threats are often introduced into the company via removable devices. Choose which devices to allow to run and decide what will be blocked or scanned automatically.

    Application Control (Blacklisting)

    Enables full visibility and control of running applications by blacklisting unwanted software. Helps limit the risk of malicious code running undetected.

    Application Control (Whitelisting)

    Provides full visibility and control of applications installed or running on company endpoints, and prevents the execution of any application not allowed by policy.

    (On-Premises Console Only)
    (On-Premises Console Only)

    Firewall

    Fully-featured two-way firewall that controls applications' access to the network and to the Internet. Furthermore, the firewall can protect the system against port scans, restrict ICS and warn when new nodes join a Wi-Fi connection

    EXTEND SECURITY WITH COMPATILE PRODUCTS

     
     
     

    AVAILABLE ADD ONS

     
     
     

    Email Security

    For all email clients, including Office 365

    available
    available
    available

    Patch Management

    Keeps OSes and Applications up to date across the entire Windows install base

    available
    available
    available

    Full Disk Encryption

    Protects data for the entire endpoint hard drive by leveraging the encryption mechanisms provided by Windows (BitLocker) and Mac (FileVault).

    available
    available
    available

    HyperDetect? & Cloud Sandbox

    Enable HyperDetect? and Cloud Sandbox for Enterprise a-la-carte licensing

     
     
    available

    Endpoint Detection and Response module

    Enables EDR features on the Enterprise a-la-carte licensing

     
     
    available

    Endpoint Detection and Response Storage

    Enables long term storage of EDR raw data (30, 90 and 180 days)

    available (Cloud Console Only)
     
     

    COMPATIBLE PRODUCTS

     
     
     

    Hypervisor Introspection

    Revolutionary technology that uses the hypervisor to protect virtual machines from advanced kernel-level exploits

    compatible (On-Premises Console Only)
    compatible (On-Premises Console Only)
    compatible

    Security for Storage

    Machine learning-driven antimalware scanning for ICAP-compatible network-attached storage (NAS) and file-sharing systems

    compatible
    compatible
    compatible

    Network Traffic Security Analytics

    Cloud threat intelligence, Machine Learning and behavior analytics applied to network traffic to detect advanced attacks early and enable effective threat hunting

    compatible
    compatible
    compatible

    Advanced Threat Intelligence

    Collects data from sensors across the globe - correlate hundreds of thousands of Indicators of Compromise and turn data into actionable, real-time insights.

    compatible
    compatible
    compatible

    Sandbox Analyzer On-premises

    Next-generation AI-powered on-premises sandbox with advanced detection, reporting & attack visibility

    compatible
    compatible
    compatible

    AVAILABLE SERVICES

     
     
     

    Managed Detection and Response Service Pack

    Staffed by our experienced security analysts and using an award-winning suite of technology, the MDR service monitors detailed telemetry to quickly and effectively respond to malicious activities, actively removing the threat to reduce dwell time and limit any damage.

    available (Cloud Console Only)
     
    available when EDR add-on is present

    Professional Services

    Empower your organization with optimal security configuration, protection and tailored services.

    available
    available
    available

    Premium Support

    Choose the Silver ,Gold or Platinum Premium Enterprise Support packages, depending on the response times and the types of proactive services necessary for your organization.

    available
    available
    available

    Details

    Covers desktops, servers and Exchange mailboxes. No more than 35% of licenses can be used on servers.
    Covers desktops, servers and Exchange mailboxes. No more than 35% of licenses can be used on servers.
    A la carte licensing
     

    For all MSPs NextGen AV & Endpoint Security (Core Product)

    Recommended for MSPs seeking comprehensive coverage and compliance

    Recommended for MSPs looking for advanced unified security solutions

    FUNCTIONALITY

     
     
     

    Risk Analytics

    Assesses, prioritizes and hardens endpoint security misconfigurations and settings with an easy-to-understand prioritized list.

    Local and Cloud Machine Learning

    Predictive detection of unknown malware; Dynamic file analysis trained on billions of samples; Local machine learning trained on 80,000 malware features.

    Cloud Threat Inteligence

    Threat intelligence including information about malicious URLs, patterns, websites, etc collected and updated in 3 seconds using the Bitdefender Global Protective Network of over 500 Million endpoints

    Exploit Defense

    Focuses on attack tools and techniques to detect both known and zero-day exploits that target popular software applications.

    Web Content Control

    Restrict user access to potentially malicious websites or web categories such as gambling

    Network Attack Defense

    Protect against threats that exploit network vulnerabilities such as Brute Force Attacks or Password Stealers

    Web Threat Protection

    Scans incoming web traffic, including SSL, http and https traffic, to prevent the download of malware to the endpoint. Automatically blocks phishing and fraudulent web pages. Displays search ratings signaling trusted and untrusted pages.

    Firewall

    Endpoints are protected with fully featured two-way firewall with Intrusion Detection, critical for protecting remote devices.

    Device Control

    Threats are often introduced into the company via removable devices. Choose which devices to allow to run and decide what will be blocked or scanned automatically.

    Process Inpector (Automatic Detection)

    Behavior-based real time detection; Monitors all processes running in the operating system and if the process is deemed malicious, will terminate it.Formerly known as Advanced Threat Control (ATC).

    Full Disk Encryption

    Protects data for the entire endpoint hard drive by leveraging the encryption mechanisms provided by Windows (BitLocker) and Mac (FileVault).

     
    Add-on
    Add-on

    Patch Management

    Manual and automatic Patching of Windows and 3rd party applications that mitigates application vulnerablities and risks of exploit attacks

     
    Add-on
    Add-on

    Cloud-hosted email security and antispam

    Protect Office 365 or other cloud & on-prem. email systems, detect executive impersonation, stop spam, phishing, advanced attacks before they reach users.

     
    Add-on
    Add-on

    Security for Virtualized Environments

    Optimized protection for virtual desktops or servers that

     
    Add-on
    Add-on

    Security for AWS

    VM Protection that is integrated with Amazon Web Services and optimized for peak performce

     
    Add-on
    Add-on

    Exchange on-prem antispam and security

    Email Antispam and Antimalware protection for organizations hosting their Exchange server

     
    Add-on
    Add-on

    HyperDetect (Tunable Machine Learning)

    Tunable machine learning layer, detects sophisticated threats. Blocks hacking tools, fileless attacks, zero-day malware and more.

     
     
    Add-on (Advanced Threat Security)

    Fileless Attack Defense

    Protects against script-based attacks that execute in memory using tools such as PowerShell or Command Prompt

     
     
    Add-on (Advanced Threat Security)

    Sandbox Analyzer

    Automatically analyze suspicious files by detonating in a safe cloud environment delivering a verdict and full visibility and context into threat actions

     
     
    Add-on (Advanced Threat Security)

    Incident Visualization

    Visual representation of each step in an attack that helps understand impact, identify potential protection gaps and support compliance

     
     
    Add-on (Endpoint Detection and Response)

    Prioritized Alerts Investigation

    See suspicious activity as alerts that leverage MITRE events and investigate potential breaches

     
     
    Add-on (Endpoint Detection and Response)

    Incident response

    Respond to incidents with options such as Endpoint Isolation which disconects a system from the network or Live Response which enables remote connection and log gathering from the impacted endpoint

     
     
    Add-on (Endpoint Detection and Response)

    Anomaly Defense

    Baselines system resources to spotlight unusual behavior based on MITRE threat techniques and Bitdefender's own research.

     
     
    Add-on (Endpoint Detection and Response)

    We're here for you

    Whether by phone, web, chat or e-mail, our dedicated support team is here to assist you with installation, deployment and any other questions you might have.

    Get support
    打鱼游戏下载