HiSec Endpoint
HiSec Endpoint Stands Out with Unique One-Click Recovery from Ransomware, Ensuring Robust Security with Lightweight EDR Agent.
Este sitio utiliza cookies. Si continúa navegando en este sitio, acepta nuestro uso de cookies. Lea nuestra política de privacidad>
Productos, soluciones y servicios empresariales
HiSec Endpoint
Efficient detection of unknown threats
Innovative endpoint-side threat source tracing graph engine + dynamic behavior analysis, achieving > 90% unknown threat detection accuracy.
Endpoint ransomware prevention, zero data loss
Event-triggered backup: kernel-level real-time awareness of file exceptions and file backup, enabling one-click handling and rollback of ransomware events.
Lightweight deployment, zero lag on endpoints
Lightweight agent, < 4% CPU usage, < 200 MB memory usage, < 20 MB reported data per agent per day, with no impact on user experience.
Specifications
Specifications | HiSec Endpoint |
Endpoint Identification and Management | Automatic endpoint identification: provides automatic endpoint asset inventory capabilities. Endpoints
can be automatically identified after having EDR Agent installed. Asset information management: automatically and centrally manages endpoint asset information such as the host list, processes, ports, and components. Endpoint security management: intelligently analyzes endpoint security and displays endpoint asset security analysis scores and risk overview. |
Threat Detection and Handling | Intrusion detection: offers endpoint behavior detection capabilities based on the behavior detection
engine to detect malicious behaviors such as brute-force attacks, abnormal login, and privilege
escalation. Event aggregation: aggregates discrete ransomware-related alarm events into ransomware events based on the process call chain and supports one-click handling. |
Virus Disposal | Virus scan: uses Huawei's third-generation antivirus engine to update the antivirus signature database
daily, update critical viruses in real time, and offer high-quality infected file detection
capabilities. Threat analysis: supports threat analysis on detected infected files and displays detailed threat information, such as virus identifiers, risk values, and confidence levels. |
Proactive Defense | Bait capture: places bait files based on ransomware signatures to detect and report abnormal behaviors
in real time. File anti-tampering: performs access permission control and real-time detection on key files to detect tampering in a timely manner. Real-time protection: scans all directories in real time, identifies malware files in a timely manner, and blocks their transmission. |
Traceability Analysis | Forensic analysis: collects and stores endpoint information, and performs forensic analysis on threat
events through data mining and correlation analysis. Attack visualization: The EDR digital modeling and source tracing inference algorithm are used to visualize attacks and accurately restore attack chains. |
Ransomware Encrypted File One-click Recovery | Event-triggered backup: Kernel-level real-time awareness of file exceptions and file backup enable one-click handling and rollback of ransomware events. |