GravityZone 精英版
顶级的端点保护,适合需要高级安全保护的企业
保护物理PC,服务器
下一代保护为虚拟化环境提供特殊优化的安全保护
虚拟化安全解决方案,保护虚拟桌面和虚拟服务器移动设备
保护Android和iOS移动设备Microsoft® Exchange
反恶意软件,反垃圾邮件,附件过滤,内容过滤风险管理
基线评估,修复配置错误Web 威胁防护
扫描传入的网络流量,包括 SSL、HHTP 和 HTTPS 流量,以防止恶意软件下载到端点。自动阻止网络钓鱼和欺诈网页。 显示搜索评级,受信任和不受信任的页面设备控制
防止威胁通过可移动设备引入公司。 选择允许运行的设备,并决定自动阻止哪些设备。应用程序控制 黑名单
将不需要的软件列入黑名单,控制其运行。应用程序控制 白名单
对公司端点上安装或运行的应用程序的完全可视化和控制,防止执行任何策略不允许的应用程序。防火墙
功能齐全的双向防火墙,可控制应用程序对网络和 Internet 的访问。 此外,防火墙可以保护系统免受端口扫描攻击。沙盒分析器
发送可疑文件进行引爆、分析并实时提供判决。 检测“免杀”病毒、零日攻击和针对性攻击。HyperDetect™ (可调节机器学习)
可调节机器学习,检测复杂威胁。 阻止黑客工具、无文件攻击、零日恶意软件等。集中扫描
通过优化和集中扫描任务,降低对虚拟机的资源占用,也适合老配置电脑。本地和云机器学习
未知恶意软件的预测检测; 对数十亿样本进行动态文件分析训练; 本地机器学习对 80000 个恶意软件功能进行训练。结合全球超过 5 亿个端点的威胁情报。高级反漏洞利用
Focuses on attack tools and techniques to detect both known and zero-day exploits that target popular software applications.高级威胁防护
Behavior-based real time detection; Monitors all processes running in the operating system and if the process is deemed malicious, will terminate it.Formerly known as Advanced Threat Control (ATC).勒索缓解
Creates a real-time back-up of the files before being modified by the suspicious process to mitigate the risk of losing data during advanced ransomware attacks.自动清除和回滚恶意更改
Automatically blocks confirmed threats through a set of predefined rules, including process termination, moving to quarantine or access blocking.无文件攻击防护
Protects against attacks that attempt to write changes directly in memory.网络攻击防护
Protects against threats that use network vulnerabilities.邮件安全
For all email clients, including Office 365漏洞扫描与补丁管理
Keeps OSes and applications up to date across the entire Windows install base硬盘加密
Protects data for the entire endpoint hard drive by leveraging the encryption mechanisms provided by Windows (BitLocker) and macOS (FileVault).物理和虚拟电脑,服务器
State of the art security for end-user devices.为虚拟化环境提供特殊优化的安全保护
Pro-VM, Pro-Cloud defenses with Smart Centralized Scanning for high performance and optimum user experience.移动设备
Device and platform agnostic mobile security.Microsoft® Exchange
Unrivalled defense against malware, spam and phishing attempts.本地和云机器学习
Predictive detection of unknown malware; Dynamic file analysis trained on billions of samples; Local machine learning trained on 80,000 malware features.Threat intelligence from over 500 million endpoints globally.高级反漏洞
Focuses on attack tools and techniques to detect both known and zero-day exploits that target popular software applications.高级清除引擎
Automatically blocks confirmed threats through a set of predefined rules, including process termination, moving to quarantine or access blocking.无文件攻击防护
Protects against attacks that attempt to write changes directly in memory.网络攻击防护
Protects against attacks that attempt to write changes directly in memory.HyperDetect™ (可调节机器学习)
Tunable machine learning layer, detects sophisticated threats. Blocks hacking tools, fileless attacks, zero-day malware and more.沙盒分析器
Sends suspicious files for detonation, analyzes and provides a verdict in real time. Detects zero-day & targeted attacks; Real time attack prevention with auto-submit; Analyzes once enterprise-wide block.高级威胁防护
Behavior-based real time detection; Monitors all processes running in the operating system and if the process is deemed malicious, will terminate it. Formerly known as Advanced Threat Control (ATC).勒索缓解
Creates a real-time backup of the files before being modified by the suspicious process to mitigate the risk of loosing data during advanced ransomware attacks.攻击可视化
Easy to understand visual guides highlight critical attack paths, easing burdens on IT staff.根本原因分析
Highlights the attack vector, the attack entry point, and how the attack originated. Helps pinpoint the origin node of attack, highlighted in the Incident page. The confidence score provides context for security events.异常检测
Baselines system resources to spotlight unusual behavior based on MITRE threat techniques and Bitdefender's own research.MITRE 标签
MITRE attack techniques and indicators of compromise provide up to the minute insight into named threats and other malware that may be involved.风险管理
Assesses, prioritizes and hardens endpoint security misconfigurations and settings with an easy-to-understand prioritized list.Web 威胁防护
Scans incoming web traffic, including SSL, HTTP and HTTPSs traffic, to prevent the download of malware to the endpoint. Automatically blocks phishing and fraudulent web pages. Displays search ratings signaling trusted and untrusted pages.设备控制
Threats are often introduced into the company via removable devices. Choose which devices to allow to run and decide what will be blocked or scanned automatically.应用程序控制 黑名单
Enables full visibility and control of running applications by blacklisting unwanted software. Helps limit the risk of malicious code running undetected.应用程序控制 白名单
Provides full visibility and control of applications installed or running on company endpoints, and prevents the execution of any application not allowed by policy.防火墙
Fully-featured two-way firewall that controls applications' access to the network and to the Internet. Furthermore, the firewall can protect the system against port scans, restrict ICS and warn when new nodes join a Wi-Fi connection邮件安全
For all email clients, including Office 365漏洞扫描与补丁管理
Keeps OSes and Applications up to date across the entire Windows install base硬盘加密
Protects data for the entire endpoint hard drive by leveraging the encryption mechanisms provided by Windows (BitLocker) and Mac (FileVault).HyperDetect™ & 云沙盒
Enable HyperDetect™ and Cloud Sandbox for Enterprise a-la-carte licensingEDR
Enables EDR features on the Enterprise a-la-carte licensingEDR事件存储包
EDR原始数据扩展到更久 (30, 90 和 180 天)