- Enhanced protection against phishing and web intrusion attacks to counter the rising number of incidents worldwide.
- Accurate detection of phishing and web intrusion attacks, with detailed insights, including a comprehensive visual kill chain to pinpoint the origin and associated behaviors of the attack.
- Users can configure Sangfor Endpoint Secure to respond automatically to such attacks, such as terminating malicious processes and deleting malicious files to prevent lateral movement.
Advanced Endpoint Security Solution
Sangfor Endpoint Secure utilizes a different approach to defending systems from malware and APT threats compared to current next-generation Anti-virus (NGAV) or endpoint detection & response (EDR) solutions.
Endpoint Secure provides a holistic response to malware infections and APT breaches across the entire organization's network, with ease of management, operation, and maintenance. The solution is scalable to meet the needs of any organization needing on-premise management, cloud management, or a hybrid solution when it comes to endpoint security, protection, detection, and response.
Sangfor Endpoint Secure Key Capabilities
Phishing and web intrusion protection with automated response
Ransomware Protection and Recovery
- Protects against all types of ransomware through static and dynamic AI-based detection engines.
- Detects suspicious ransomware-related processes and blocks them in as little as 3 seconds to ensure minimal impact on users’ assets.
- Ransomware indicators of compromise are collected from over 12 million devices deployed with Sangfor Endpoint Secure, allowing it to achieve a detection accuracy rate of 99.83%.
- In addition to existing ransomware protections, such as honeypot and RDP two-factor authentication, Sangfor Endpoint Secure provides ransomware recovery capabilities. These include file recovery and recovery via Windows Volume Shadow Copy Service (VSS) snapshot backup to fully secure and restore your data in case of ransomware encryption.
Synergy with Network and Cloud
Endpoint Secure integrates with Sangfor NGAF, IAG, and Cyber Command to enable advanced and coordinated threat detection and response. Threat correlation between endpoint, network, and cloud makes it possible to detect sophisticated threats that are missed by point solutions and produce an integrated evidence chain to streamline post-attack threat hunting and weakness remediation.
Phishing and web intrusion protection with automated response
- Enhanced protection against phishing and web intrusion attacks to counter the rising number of incidents worldwide.
- Accurate detection of phishing and web intrusion attacks, with detailed insights, including a comprehensive visual kill chain to pinpoint the origin and associated behaviors of the attack.
- Users can configure Sangfor Endpoint Secure to respond automatically to such attacks, such as terminating malicious processes and deleting malicious files to prevent lateral movement.
Ransomware Protection and Recovery
- Protects against all types of ransomware through static and dynamic AI-based detection engines.
- Detects suspicious ransomware-related processes and blocks them in as little as 3 seconds to ensure minimal impact on users’ assets.
- Ransomware indicators of compromise are collected from over 12 million devices deployed with Sangfor Endpoint Secure, allowing it to achieve a detection accuracy rate of 99.83%.
- In addition to existing ransomware protections, such as honeypot and RDP two-factor authentication, Sangfor Endpoint Secure provides ransomware recovery capabilities. These include file recovery and recovery via Windows Volume Shadow Copy Service (VSS) snapshot backup to fully secure and restore your data in case of ransomware encryption.
Synergy with Network and Cloud
Endpoint Secure integrates with Sangfor NGAF, IAG, and Cyber Command to enable advanced and coordinated threat detection and response. Threat correlation between endpoint, network, and cloud makes it possible to detect sophisticated threats that are missed by point solutions and produce an integrated evidence chain to streamline post-attack threat hunting and weakness remediation.
World-Class Malware Detection
![World-Class Malware Detection](/sites/default/files/styles/webp/public/2022-11/world-class_malware_detection.png.webp?itok=PyQWsION)
Use Cases
Operating Systems
Virtualization
3 Seconds to Kill Ransomware | Sangfor Endpoint Secure - Ransomware Detection and Recovery
![video-image](https://img.youtube.com/vi/8ZdVz7kPiDw/hqdefault.jpg)
![video-image](https://img.youtube.com/vi/O6s265csvWE/hqdefault.jpg)
![video-image](https://img.youtube.com/vi/fvI02s622Ag/hqdefault.jpg)
![video-image](https://img.youtube.com/vi/cw5asamRqYA/hqdefault.jpg)
![video-image](https://img.youtube.com/vi/CZp_iwZgvlE/hqdefault.jpg)
![video-image](https://img.youtube.com/vi/gx8ObAj5_54/hqdefault.jpg)
![video-image](https://img.youtube.com/vi/Ktx6fS3zYTc/hqdefault.jpg)
![video-image](https://img.youtube.com/vi/YNUngrDGFg0/hqdefault.jpg)
Get in Touch With Us
Latest Webinar
![Latest Webinar](/sites/default/files/styles/webp/public/2022-08/latest_webinar.jpg.webp?itok=Z4nYlrnN)
Exploring the 2024 CyberRatings Enterprise Firewall Test with Vikram Phatak
We are honored to invite you to an exclusive webinar featuring Vikram Phatak, founder and CEO of CyberRatings.org. Join us to enhance your cybersecurity knowledge.
Enhancing Automation and Usability: What's New in Sangfor Network Secure v8.0.95
The upcoming Sangfor Network Secure v8.0.95 introduces new automation capabilities, join the webinar to learn more.
Combat Remote Access Challenges with Sangfor Zero Trust Guard
Join us for this exclusive webinar and learn how Sangfor Zero Trust Guard can revolutionize your organization's security posture.
Latest Blog
![latsest webinars img](/sites/default/files/styles/webp/public/2022-04/unsplash_3gznpblimwc.png.webp?itok=Yk1VmBB5)
Ransomware Breach Disrupted Indonesia Immigration and Other Government Services
The Indonesia National Data Center was targeted by a ransomware attack, causing disruptions to government services such as immigration.
Jollibee Data Breach in the Philippines Affected 11 Million Customers
Jollibee data breach affected around 11 million customers and its connected companies, making it the largest data breach in the Philippines.
Role of Artificial Intelligence (AI) in Threat Detection
AI has profound impact on cybersecurity as it enhances threat detection, automates incident responses, and predicts vulnerabilities with precision.
Latest News
![latest news img](/sites/default/files/styles/webp/public/2022-03/unsplash_iFSvn82XfGo.png.webp?itok=MNbN8ApA)
Sangfor Technologies Peer-Recognized as a Strong Performer in Gartner® Voice of the Customer for Endpoint Protection Platforms
Sangfor Technologies is delighted to be recognized in the latest Gartner Voice of the Customer for Endpoint Protection Platforms1 (VoC for EPPs).
Sangfor Recommended Again in CyberRatings.org 2024 Enterprise Firewall Test
Sangfor Technologies has once again received a “Recommended” rating in the 2024 CyberRatings.org Enterprise Firewall Test.
Sangfor Technologies Peer-Recognized as a Strong Performer in Gartner® Peer Insights™ Voice of the Customer for Network Firewalls
Sangfor Technologies is proud to announce its inclusion in the latest Gartner Peer Insights “Voice of the Customer” for Network Firewalls.
Frequently Asked Question
You can install Endpoint Secure Protect on a system with another AV or EDR installed. During the installation, you will be asked if there is other anti-virus software installed. If you say “yes”, the installation will ask if you want to continue. If you choose to continue with the installation, the installation will continue in compatibility mode and the Protect agent will automatically disable real-time protection to not interfere with operation of the existing AV agent.
The Endpoint Secure management server includes the NGAF WAF module to prevent web-based attacks. Both the hardware and virtual versions of the management server are assessed by Sangfor’s BlueSecOps Team to determine if any risks or vulnerabilities exist. Security hardening is performed to minimize attack surfaces by closing all unnecessary ports and services.
Yes, you can choose when agent groups or individual agents are upgraded. This gives you flexibility and control to stagger or delay agent upgrades based on organizational needs.