Marche
Categorie
Scegli solo i prodotti...
Tutti i Costi Finanziari sono esposti trasparentemente.
Tutti i prezzi sono comprensivi di IVA.
|
SCHEDA PRODOTTO
. |
Descrizione disponibile anche in:
Effective malware protection for servers and storage systems\nProtect against viruses, rootkits, and data-stealing malware while simplifying and automating security operations on servers and storage systems. This reliable solution from the market leader in server\nsecurity offers real-time protection, high performance, and low processing overhead.\n\nOur patented technology:\n- Provides the strongest physical defenses.\n- Helps deliver real-time server protection against viruses, worms, spyware and Trojan attacks.\n- Reduces administrative costs through management of remote installation, maintenance, and upgrades from a central console.\n- Minimizes manual tasks by automating routine antivirus maintenance and updates.\n- Provides greater deployment flexibility and control through granular policy management.\n- Alerts administrators to virus outbreaks and emergencies to help reduce response time.\n- Provides comprehensive logs and reports to help identify dangerous activities before they become threats.\n\nServerProtect for Microsoft Windows and Novell NetWare\nSimple Effective Anti-Malware Protection for Enterprise-class Servers.\nScan and detect malware in real time and leverage cleanup capabilities to help remove malicious code and repair any system damage caused by them. A single management console centrally enforces, administers, and updates malware protection on every server throughout an organization.\n\nEnterprise servers can be a vulnerable, centralized point of information exchange. Even from inside the network, users or applications without adequate protection can unintentionally upload infected files to the server, which can spread to other systems that access these files. Additionally, large organizations may have hundreds or thousands of individual server machines that require monitoring, configuration, and maintenance. More importantly, todays sophisticated attacks can target multiple points on the network and leave unseen trails of damage and the potential for re-infection.\n\nReliable and Efficient Malware Protection\n- Features award-winning scan engine technology with an extensive track record in delivering comprehensive malware protection;\n- Combines rule-based and pattern-recognition technologies for efficient malware detection;\n- Includes new APIs for better spyware and rootkit detection and remediation;\n- Secures internal communication channels to prevent disruption by malware;\n- Delivers 24x7 anti-malware support from TrendLabsSM global research and support centers.\n\nAutomates Scanning to Optimize Protection\n- Customizes by task to meet specific workflow needs for real-time scans, ad-hoc scans, scheduled scans, deployment, logging, and statistics;\n- Breaks up scheduled scan tasks to scan high-usage directories on a different frequency than low use directories;\n- Reduces resource impact by enabling traffic analysis and creation of custom RTS policies for different times of the day.\n\nCentralized Deployment and Management\n- Streamlines initial deployment and ongoing management of all major Windows and NetWare Servers;\n- Centrally manages system monitoring, software updates, configuration changes, and event reporting through a remote console;\n- Controls multiple ServerProtect Information Servers and deloys product updates to all servers from a single console;\n- Deploys programs and updates to servers simultaneously and monitors server status in real time;\n- Centrally manages security strategies deployed throughout a multiple-site network.\n\nImmediate protection and clean-up capabilities\n- Removes malware remnants from all servers with automated malware cleaning and repairing to minimize re-infection;\n- Scans and remediates compressed archives for malware to avoid unnecessary decompression;\n- Identifies holes in the security system by running the vulnerability scanner feature, which is available upon request.\n\nServerProtect can be configured to download virus pattern files and scan engine updates automatically and then distribute them to designated servers. It uses an incremental update mechanism so that the designated servers only download the new virus pattern files that have been added since the last version, saving download time and preserving network bandwidth. ServerProtect employs a three-tier architecture: the Management Console, the Information Server, and the Normal Server. A Normal Server can be any server on the network on which ServerProtect is installedfor example, a file server or FTP server. The Management Console is used to configure dedicated Information Servers, which then control the Normal Servers.\n\nServerProtect for Linux\nStops Malware from Spreading through Linux Servers.\nProtect your Linux file servers from becoming unwitting hosts for viruses, Trojans and a full range of other malware. With support for all common Linux distributions, this reliable solution now provides enhanced spyware protection and kernel independenceanother powerful solution to your enterprises security and compliance strategy.\n\nLinux-based servers frequently interact with clients running other operating systems, such as Microsoft Windows. They store and serve files created on and for those platforms. At the same time, the increasing popularity of the Linux platform has resulted in the growth of viruses and other malware specifically targeting Linux servers. With Linux now representing 15-20% of the worldwide server market and growing, these attacks are becoming more frequent and more severe. Thus, securing Linux-based servers from hosting infected files is imperative for any enterprise.\n\nPowerful Antivirus and Spyware Protection\n- Scans, detects and removes viruses in real time;\n- Now with enhanced spyware detection and removal capability;\n- Scan engine certified by Virus Bulletin (VB) for reliable scanning.\n\nHigher Performance and Flexibility\n- Real-time, on-demand, and scheduled scan- ning uses latest multi-threaded scanning engine for highest performance while kernel-level scanning minimizes performance degradation;\n- Adjustable CPU utilization during scan process allows users to balance performance impact and scanning time;\n- Kernel Hook Module (KHM) is now open to General Public License to allow customers to recompile to fit to their own customized kernel variants.\n\nAntivirus Policy Compliance\n- Enables antivirus policy enforcement and accelerates update deployment through automatic updates of virus patterns and scan engines;\n- Allows administrators to stay apprised of virus or program events through email notifications and SNMP traps.\n\nCentralized Management and Reporting\n- Seamless integration with Trend Micro Control Manager, centralized threat management console;\n- Enables central management of attack information, policy deployment, pattern file and scan engine deployment, and reports on policy implementation;\n- Reduces maintenance efforts through automatic component updates.
|
Confezione: |
|
|
Peso Lordo: 1 Kg
Dimensioni Lorde: 100x100x100 mm |
|
|
|
|
|
Trend Micro - Sito web:http:// |
|
|
|
|
|
|
|
|
|
|
Tutti i prezzi sono comprensivi di IVA.
Il Listino è in EURO, salvo se diversamente indicato. Marchi e i nomi di prodotti sono registrati dai rispettivi titolari. Dati a cura del Fornitore. Non possiamo essere ritenuti responsabili per eventuali errori o refusi presenti. Prodotti, versioni, prezzi, termini e garanzie sono soggetti a cambiamenti senza preavviso. In ogni rapporto di fornitura valgono le Condizioni Generali di Vendita. Prezzi aggiornati in tempo reale. |
|
|
Perchè Comprare qui? |
|
Prodotti di qualità dei maggiori Marchi |
|
Informazione sulla disponibilità dei prodotti |
|
Aiuto all'acquisto |
|
Sicurezza nell'acquisto |
|
Scelta della forma di pagamento |
|
Pagamenti sicuri con transazioni riservate |
|
Rispetto della Privacy |
|
Supporto nella soluzione di problemi |
|
Professionalità e competenza del nostro Staff |
|
Ricerca su richiesta di prodotti non a Listino |
|