- Enhanced protection against phishing and web intrusion attacks to counter the rising number of incidents worldwide.
- Accurate detection of phishing and web intrusion attacks, with detailed insights, including a comprehensive visual kill chain to pinpoint the origin and associated behaviors of the attack.
- Users can configure Sangfor Endpoint Secure to respond automatically to such attacks, such as terminating malicious processes and deleting malicious files to prevent lateral movement.
Advanced Endpoint Security Solution
Sangfor Endpoint Secure utilizes a different approach to defending systems from malware and APT threats compared to current next-generation Anti-virus (NGAV) or endpoint detection & response (EDR) solutions.
Endpoint Secure provides a holistic response to malware infections and APT breaches across the entire organization's network, with ease of management, operation, and maintenance. The solution is scalable to meet the needs of any organization needing on-premise management, cloud management, or a hybrid solution when it comes to endpoint security, protection, detection, and response.
Sangfor Endpoint Secure Key Capabilities
Phishing and web intrusion protection with automated response
Ransomware Protection and Recovery
- Protects against all types of ransomware through static and dynamic AI-based detection engines.
- Detects suspicious ransomware-related processes and blocks them in as little as 3 seconds to ensure minimal impact on users’ assets.
- Ransomware indicators of compromise are collected from over 12 million devices deployed with Sangfor Endpoint Secure, allowing it to achieve a detection accuracy rate of 99.83%.
- In addition to existing ransomware protections, such as honeypot and RDP two-factor authentication, Sangfor Endpoint Secure provides ransomware recovery capabilities. These include file recovery and recovery via Windows Volume Shadow Copy Service (VSS) snapshot backup to fully secure and restore your data in case of ransomware encryption.
Synergy with Network and Cloud
Endpoint Secure integrates with Sangfor NGAF, IAG, and Cyber Command to enable advanced and coordinated threat detection and response. Threat correlation between endpoint, network, and cloud makes it possible to detect sophisticated threats that are missed by point solutions and produce an integrated evidence chain to streamline post-attack threat hunting and weakness remediation.
Phishing and web intrusion protection with automated response
- Enhanced protection against phishing and web intrusion attacks to counter the rising number of incidents worldwide.
- Accurate detection of phishing and web intrusion attacks, with detailed insights, including a comprehensive visual kill chain to pinpoint the origin and associated behaviors of the attack.
- Users can configure Sangfor Endpoint Secure to respond automatically to such attacks, such as terminating malicious processes and deleting malicious files to prevent lateral movement.
Ransomware Protection and Recovery
- Protects against all types of ransomware through static and dynamic AI-based detection engines.
- Detects suspicious ransomware-related processes and blocks them in as little as 3 seconds to ensure minimal impact on users’ assets.
- Ransomware indicators of compromise are collected from over 12 million devices deployed with Sangfor Endpoint Secure, allowing it to achieve a detection accuracy rate of 99.83%.
- In addition to existing ransomware protections, such as honeypot and RDP two-factor authentication, Sangfor Endpoint Secure provides ransomware recovery capabilities. These include file recovery and recovery via Windows Volume Shadow Copy Service (VSS) snapshot backup to fully secure and restore your data in case of ransomware encryption.
Synergy with Network and Cloud
Endpoint Secure integrates with Sangfor NGAF, IAG, and Cyber Command to enable advanced and coordinated threat detection and response. Threat correlation between endpoint, network, and cloud makes it possible to detect sophisticated threats that are missed by point solutions and produce an integrated evidence chain to streamline post-attack threat hunting and weakness remediation.
World-Class Malware Detection

Use Cases
Awards & Achievements



Operating Systems
Virtualization
3 Seconds to Kill Ransomware | Sangfor Endpoint Secure - Ransomware Detection and Recovery








Get in Touch With Us
Latest Webinar

PIKOM Lead 2024
Sangfor had the privilege of joining PIKOM Lead 2024, a prestigious event hosted by PIKOM to explore the future of digital innovation.
The Future of Virtualization: Exploring New Horizons
Exploring New Horizons in Virtualization Sangfor was honored to participate in The Future of Virtualization.
The GESS Dubai Education Exhibition and Conference
From engaging networking opportunities to insightful discussions, we’re excited to be part of the GESS Dubai Education Exhibition and Conference.
Latest Blog

Top AI News of the Week: Grok 3 and Leading AI Trends
AI news has been shaking up the industry for the last few years. We look at some of the main AI trends leading the way such as Grok 3, Mistral AI and DeepSeek.
A French Revolution in AI: Mistral AI Launches ‘Le Chat’ Chatbot
The French Mistral AI company has now joined the AI race with the launch of its Le Chat chatbot. We look into how it compares with existing AI platforms.
What Is DeepSeek: A Guide to the Open-Source AI and its Cyber Security Concerns
The AI revolution is booming, and DeepSeek is the latest to make waves. We explore this open-source AI platform, its development, and the security concerns.
Latest News

Sangfor Technologies Achieves ISO/IEC 27001:2022 Certification for Global Security Operations Centre (GSOC)
Sangfor Technologies achieves ISO/IEC 27001:2022 certification for its GSOC in Kuala Lumpur, ensuring top-tier security and data protection for global clients.
Sangfor and Veeam Forge Strategic Partnership to Enhance Cloud Data Management Solutions
Sangfor becomes the first Chinese HCI vendor to join the Veeam Cloud & Service Provider (VCSP) program, enhancing cloud services and data protection.
Sangfor and HKT Sign Memorandum of Understanding to Meet Critical Infrastructure Requirements for Enterprises
Sangfor and HKT sign MOU to address enterprise critical infrastructure needs, ensuring compliance with new regulations through expert network security solutions.
Frequently Asked Question
You can install Endpoint Secure Protect on a system with another AV or EDR installed. During the installation, you will be asked if there is other anti-virus software installed. If you say “yes”, the installation will ask if you want to continue. If you choose to continue with the installation, the installation will continue in compatibility mode and the Protect agent will automatically disable real-time protection to not interfere with operation of the existing AV agent.
The Endpoint Secure management server includes the NGAF WAF module to prevent web-based attacks. Both the hardware and virtual versions of the management server are assessed by Sangfor’s BlueSecOps Team to determine if any risks or vulnerabilities exist. Security hardening is performed to minimize attack surfaces by closing all unnecessary ports and services.
Yes, you can choose when agent groups or individual agents are upgraded. This gives you flexibility and control to stagger or delay agent upgrades based on organizational needs.