OfficeScan 10.6 Endpoint Protection
for Physical and Virtual Desktops
Unleash the power of physical and virtual desktops
Consolidate your endpoint and mobile security with a unified management infrastructure that offers global threat intelligence to stop malware in the cloud, and provides virtual patching against zero-day threats and optimized security for virtual desktops.
OfficeScan is a powerful endpoint security solution that combines on-premise and in-the-cloud security technologies to safeguard file servers, desktops, laptops and mobile devices.
To place an order, contact your Account Manager directly or call Zones at 800.408.9663
OfficeScan Endpoint Protection includes:
Unique plug-in architecture:OfficeScan, with its flexible architecture, makes it possible to add security services as needed, and apply future updates without having to redeploy the entire solution.
- Data Loss Prevention Plug-In
- Mobile Security Plug-In
- Intrusion Defense Firewall Plug-In
- Security for Mac
OfficeScan isolates desktop-environment control and streamlines management to extend the life of your existing hardware.
- Automatically recognizes whether an agent is on a physical or virtual endpoint to better target protection
- Prevents network, CPU, and storage conflicts by serializing scan and update operations per virtual server
- Shortens scan times of virtual desktops by white-listing base images and previously scanned content
OfficeScan protects endpoints, on or off the corporate network, against viruses, Trojans, worms, spyware, and new variants as they emerge.
- Reduces the burden of pattern file management and lowers performance impact
- Improves web performance and privacy by synchronizing with a local server
- Detects and removes active and hidden rootkits
- Safeguards endpoint mail boxes by scanning POP3 email and Outlook folders for threats
- Queries up-to-the second data on the safety of a file before it's accessed
OfficeScan centralizes management capabilities, for heightened visibility and greater control.
- Automatically cleans endpoints of malware, including processes and registry entries that are hidden or locked
- Easily integrates with Active Directory to retrieve and synchronize information on endpoints and report on policy compliance
- Centralizes management for physical and virtual endpoints, Macintosh computers, and mobile devices with a single, web-based console
- Supports easy task-delegation with granular role-based administration