0% found this document useful (0 votes)
96 views2 pages

Zenworks Endpoint Security Management Data Sheet

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
96 views2 pages

Zenworks Endpoint Security Management Data Sheet

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Data Sheet

ZENworks Endpoint Security Management

ZENworks Endpoint
Security Management
Secure your most vulnerable IT assets with a location-aware, policy-based solution that protects the data
on every PC, controls how endpoints communicate and access information, and monitors and maintains
the health of endpoint devices—all from a single console.

Product Overview Automatically adjust endpoint security System Requirements


Micro Focus® ZENworks® Endpoint Security ­policies and restrictions based on who
For detailed product specifications and system
Management provides fine-grained, policy- users are, where they’re located, and what requirements, visit: www.novell.com/products/
based control over all your Windows desktop and device they’re using. zenworks/endpointsecuritymanagement/
mobile PCs—including the ability to automati- Ensure peace of mind by putting your technical-information
cally change security configurations depend- security experts—rather than inexperienced
ing on a user’s role and location. By creating users—back in control of defining, enforcing,
.mp3 players; and flash memory, SCSI,
and managing policies from a central location, and maintaining endpoint security.
and PCMCIA cards.
ZENworks makes it possible to implement and When used with the ZENworks suite,
enforce tightly controlled, highly adaptive secu- Granular white listing controls that
you can manage endpoint lifecycle and
rity policies without placing any configuration or allow administrators to control the use
­security issues through a single pane of
enforcement burden on end users. ZENworks of USB devices.
glass with configuration, patch, asset,
Endpoint Security Management also features and endpoint security management— Unauditable transaction ­prevention
robust client self-defense capabilities that pro- all integrated into one console (and that locks out local storage devices
vide assurance that security policies are not cir- ­deployable as a virtual appliance). capable of copying data without leaving
cumvented; in addition, it has a complete suite an audit trail.
of monitoring, alert, reporting, and auditing tools. Optical writer (DVD/CD) and floppy
Key Features
ZENworks Endpoint Security Management drive controls that can allow, deny, or set
Key Benefits in­cludes a comprehensive, integrated set of drive access to read-only—depending on a
ZENworks Endpoint Security Management is en­ter­­prise endpoint security management and user’s location and security situation.
ready to help your organization: en­force­­ment features. AutoPlay/AutoRun controls that provide
Bring comprehensive, centralized security to centralized AutoPlay and AutoRun control
your most vulnerable IT assets—the mobile USB and Storage Device Security functionality for your whole organization.
PCs at the edges of your organization. ZENworks Endpoint Security Management
Boost productivity by relieving end users of provides robust capabilities designed to ensure Data Encryption
the burden of configuring and maintaining acceptable use of removable storage devices. With ZENworks Endpoint Security Manage­
security settings and solutions on their This includes: ment, you can centrally create, distribute, en­
own devices. Data theft protection that allows you to force, and audit encryption policies for removable
Efficiently manage every aspect of endpoint enable, disable, or set any removable file storage devices on all your endpoints. The mo-
security for every PC in your organization storage device to read-only—­including USB, ment a removable storage device is plugged
from a single console. floppy, CD/DVD, and zip drives; into a PC, the entire contents of the storage
device is encrypted, as well as any data copied Wi-Fi security controls that limit Wi-Fi
to the device at a later time. communications to wireless access points
that meet encryption standards.
Advanced Firewall Protection Wi-Fi adapter blocking that only allows
Unlike traditional application layer or hook endpoints to connect to wireless access
driver firewalls, ZENworks Endpoint Security points using corporate-approved Wi-Fi
Management resides at the Network Driver adapters.
In­­terface Specification (NDIS) layer for each
network interface card (NIC). This ensures com- Port Control
plete security protection from the moment traf- In addition to Wi-Fi security, ZENworks End­
fic enters a PC. ZENworks Endpoint Security point Security Management provides complete
Man­agement includes the following specific protection for every other type of wired and
firewall features: wireless port and communication device. This
Stateful firewall protection that only includes LAN, USB, 1394 (firewire), serial, and
­allows solicited traffic to be communicated parallel ports—as well as modems, Bluetooth, www.microfocus.com
back to a device and infrared (IrDA) connections.
TCP/UDP port rules and Access Control
Lists (ACLs) that strictly manage and Application Control
control firewall behavior on specific devices The application control component of ZEN­
Location-based firewall behavior control works Endpoint Security Management gives
Micro Focus
that automatically applies different sets you precise, policy-based control over the ap- UK Headquarters
of port rules and ACLs depending on the plications running on all your endpoints. This United Kingdom
relative security of a device’s location includes: +44 (0) 1635 565200

Centralized, policy-based control over Application blacklisting that blocks known


U.S. Headquarters
firewall settings that cannot be disabled or malicious or undesirable applications.
Rockville, Maryland
circumvented by end users or unauthorized Location-based application control that 301 838 5000
administrators can allow specific applications to run, deny 877 772 4450
True quarantine capabilities that protect them access to the network, or prevent
them from running altogether—all based Additional contact information and office locations:
your network when the security integrity of www.microfocus.com
a PC fails on the security of a user’s location.
Antivirus and spyware integrity
Wireless Security ­checking, which verifies that all required
ZENworks Endpoint Security Management pro- security applications are running properly—
vides centralized control over where, when, and and then quarantines and remediates
how users can connect to wireless networks. non-compliant devices.
This includes: VPN enforcement that ensures users
Wi-Fi management that allows you to can only connect using an authorized VPN,
create white and black lists for wireless
­ protects against “evil twin” attacks, and
­access points and implement policies prevents dangerous user behaviors such
that restrict, disable, or block Wi-Fi as “split tunneling.”
­communications in specific situations.

160-000046-002  |  N  |  12/16  |  © 2016 Micro Focus. All rights reserved. Micro Focus, the Micro Focus logo, and ZENworks, among others, are trademarks or
registered trademarks of Micro Focus or its subsidiaries or affiliated companies in the United Kingdom, United States and other countries. All other marks are the
property of their respective owners.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy