Search
  • hisec endpoint banner pc en

    HiSec Endpoint

    HiSec Endpoint Stands Out with Unique One-Click Recovery from Ransomware, Ensuring Robust Security with Lightweight EDR Agent.

Overview

  • Overview
  • Features
  • Specifications
  • Resources

HiSec Endpoint

HiSec Endpoint is a comprehensive endpoint security protection product. Using the client software deployed on enterprise endpoints, HiSec Endpoint can detect abnormal endpoint behavior in real time, detect and identify potential security threats from multiple dimensions, automatically handle threat events, intelligently trace intrusion paths, and roll back ransomware encrypted files. All of this helps enterprises safeguard core endpoint assets. As verified by an authoritative third-party organization, HiSec Endpoint can detect 100% of known ransomware and so is ideal for defending against ransomware threats.
0049 intelligent traffic scheduling

Efficient detection of unknown threats

Innovative endpoint-side threat source tracing graph engine + dynamic behavior analysis, achieving > 90% unknown threat detection accuracy.

Open Edge Computing

Endpoint ransomware prevention, zero data loss

Event-triggered backup: kernel-level real-time awareness of file exceptions and file backup, enabling one-click handling and rollback of ransomware events.

easy to deploy1

Lightweight deployment, zero lag on endpoints

Lightweight agent, < 4% CPU usage, < 200 MB memory usage, < 20 MB reported data per agent per day, with no impact on user experience.

Specifications

Specifications HiSec Endpoint
Endpoint Identification and Management Automatic endpoint identification: provides automatic endpoint asset inventory capabilities. Endpoints can be automatically identified after having EDR Agent installed.
Asset information management: automatically and centrally manages endpoint asset information such as the host list, processes, ports, and components.
Endpoint security management: intelligently analyzes endpoint security and displays endpoint asset security analysis scores and risk overview.
Threat Detection and Handling Intrusion detection: offers endpoint behavior detection capabilities based on the behavior detection engine to detect malicious behaviors such as brute-force attacks, abnormal login, and privilege escalation.
Event aggregation: aggregates discrete ransomware-related alarm events into ransomware events based on the process call chain and supports one-click handling.
Virus Disposal Virus scan: uses Huawei's third-generation antivirus engine to update the antivirus signature database daily, update critical viruses in real time, and offer high-quality infected file detection capabilities.
Threat analysis: supports threat analysis on detected infected files and displays detailed threat information, such as virus identifiers, risk values, and confidence levels.
Proactive Defense Bait capture: places bait files based on ransomware signatures to detect and report abnormal behaviors in real time.
File anti-tampering: performs access permission control and real-time detection on key files to detect tampering in a timely manner.
Real-time protection: scans all directories in real time, identifies malware files in a timely manner, and blocks their transmission.
Traceability Analysis Forensic analysis: collects and stores endpoint information, and performs forensic analysis on threat events through data mining and correlation analysis.
Attack visualization: The EDR digital modeling and source tracing inference algorithm are used to visualize attacks and accurately restore attack chains.
Ransomware Encrypted File One-click Recovery Event-triggered backup: Kernel-level real-time awareness of file exceptions and file backup enable one-click handling and rollback of ransomware events.

Resources

TOP