fbpx

Vívaro Armored Endpoint

Advanced protection in your hands.

The rise of remote workers has meant a new range of mobile devices to manage, monitor and protect.

With Vívaro Armored Endpoint we offer you a solution that strengthens the security of your devices through visibility, control and integrated proactive defense. 

Our solution has the ability to discover, monitor, assess and mitigate the risks of your end devices, reducing exposure against advanced attacks.

Fortinet reports that Latin America was the target of more than 360 billion attempted cyberattacks in 2022 of which Mexico received the most (187 billion). 

Destructive wiper malware increased by more than 50%, as cybercriminal supply chains grow more complex and sophisticated to counter evolving defenses, according to FortiGuard Labs. 

Main benefits of our Shielded Endpoint solution: 

Provides device telemetry, including user identity, protection status, unpatched vulnerabilities, security events, and more. 

Reduce the device attack surface and manage the risk that is transmitted through the device.

Pattern- and behavior-based malware detection and sandbox integration proactively detect and block threats.

Mitigate unpatched vulnerabilities, alert users, and quarantine compromised devices to stop an outbreak.

We put at your disposal leading brands in the market to adapt to your needs.

The main functionalities of our SDWAN service are:

  • Pattern-based anti-malware engine.
  • Detects polymorphic malware.
  • Blocks known attack channels and malicious websites.
  • Big date analysis, machine learning and AI in the cloud.

 * Protection against vulnerabilities.

  • Behavior-based detection.
  • It can detect ransomware and advanced malware.
  • Prevents attacks that take advantage of powerShell or other scripts.
  • Protects against zero-day attacks that target undiscovered or unpatched vulnerabilities.
  • Detects Advanced, custom or zero-day malware.
  • Automatic sending of files for analysis.
  • Sharing of threat intelligence across the enterprise.
  • Intelligence update in real time.
  • Isolates compromised devices by preventing them from accessing the network. 
  • If you have integration with Fabric, you can automatically place the compromised device in an isolated VLAN to be able to remedy it in it.
  • Web security and content filtering.
  • Policy of acceptable use of the web.
  • It works on Windows, Mac, Chromebook, iOS, and Android.
  • More than 75 categories.
  • Consistent categories like Fortigate.
  • Monitoring and control of application traffic by categories.
  • Block traffic from unwanted applications like botnets and cryptocurrency miners.
  • Control HTTPS messaging and proxy applications such as webmail.
  •  
    • The client installed on the computers serves as a VPN client, it is required to have a terminal equipment (Fortigate or some equipment that supports IPsec) to be able to carry out VPNs.

    Device Quarantine

    • Visibility of installed applications and license management to improve security.
    • Visibility of the vulnerabilities present in the devices.
    • A periodic scan can be scheduled or on certain dates with the option to configure without patching everything or certain levels of security

Use Cases

1.
Enforce corporate security policies: You can integrate Shielded Endpoint with FortiGate. In this scenario, Shielded Endpoint provides endpoint provisioning, while FortiGate provides compliance rules for the endpoint. 
2.
Security Fabric Architecture: Integrate endpoints with the Fortigate strengthening enterprise security through better endpoint visibility, compliance monitoring, vulnerability scanning, and automated response.
3.
Software Management: Basic central endpoint management when you deploy the Shielded Endpoint client using AD servers.
Previous slide
Next slide

Value proposal:

  • Personalized service: Business and personalized customer service that operates 24 hours a day, 365 days a year.

  • Comprehensive solution: Our Armored Endpoint service can be integrated with our perimeter security service to have a centralized security solution.

  • Security specialists: Your service will be in the hands of our bilingual and certified security specialists 7×24, 365 days a year.

  • Leaders: We work hand in hand with one of the leading brands in the global market in terms of cybersecurity.

connect
your company with the world