Reinforce your existing security efforts with protection against targeted attacks and zero-day threats right at the host level. LANDESK Host Intrusion Prevention System empowers your enterprise to thwart malicious attacks and rootkits using application control that prevents applications from executing in malicious ways right on your individual host systems.
Use LANDESK Host Intrusion Prevention System to extend the power of LANDESK Security Suite or LANDESK Patch Manager and LANDESK® Antivirus. Access everything you need for the most complete, layered LANDESK security solution available.
- Single console control
- Protection against malicious behaviors—not just known files
- Application control
- Added protection
Single Console Control
Use a single management console to install, configure and manage host-based intrusion prevention features for all enterprise systems. And quickly and easily perpetuate learned behaviors blocked on an individual host to host systems enterprisewide.
Protection Against Malicious Behaviors
Thwart malicious attacks with application blocking that prevents applications from executing in malicious ways right on your individual host systems. LANDESK Host Intrusion Prevention System empowers your systems to recognize malicious writes and modifications to the registry to stop malware from running at reboot. And it allows IT to lock down the registry unless and/or until writes are approved by the IT administrator.
In addition to application blocking in LANDESK Security Suite, use LANDESK Host Intrusion Prevention System to make a whitelist of applications allowed to run on systems. And give IT precise control over the applications that can run on enterprise systems and how those applications are allowed to execute. Prevent disguised, new and/or unknown malicious applications from slipping past your security defenses. And use flexible configurations to easily create and manage different whitelists for different users and groups.
Added Protection Against Rootkits and More
LANDESK Antivirus detects known rootkits in real-time. Add LANDESK Host Intrusion Prevention System for even greater protection against stealth rootkits. Prevent stealth rootkits with control over whether or not applications can execute other applications on a host. And use kernel-level network filtering to define an application’s executable files and what is and isn’t acceptable network behavior.
Also use LANDESK Host Intrusion Prevention System to certify whether or not certain applications or files can bypass some or all of its built-in protections. And prevent non-certified processes from injecting into certified processes and illegally obtaining authorization attributes.