ZENworks Endpoint Security Management provides extensive endpoint security through a variety of solutions. Together, the solutions provide a fully integrated suite for perimeter-to-core endpoint protection.
Figure 1-1 Solutions Provided by ZENworks Endpoint Security Management
Personal Firewall: Protects the endpoint device against hackers, malware, protocol attacks, and more. Because ZENworks Endpoint Security Management is integrated into the Network Driver Interface Specification (NDIS) driver for each network interface card (NIC), security protection is assured from the moment traffic enters the device.
Wireless Security: Controls where, when, and how users can connect. You can limit wireless connectivity to authorized access points, establish a minimum level of encryption strength, or even disable wireless networking completely. You can also automatically enforce VPN policies, requiring VPN software to be running while devices connect to foreign networks such as those in hotels, hot spots and coffee shops. Rogue access point detection helps ensure wireless security in and around the office.
Port Control: Secures all your endpoint communication ports and adapters, including LAN, USB, modem, Bluetooth*, infrared, 1394 (FireWire*), and serial and parallel ports.
Data Encryption: Secures data stored on endpoint devices, including information stored on both fixed and removable media, by encrypting files so they can only be read by authorized users. Keys are managed transparently throughout the enterprise, requiring no end-user involvement other than getting work done in the usual way.
USB and Storage Device Security: Prevents intentional or inadvertent transmission of data to removable storage devices. Storage devices such as thumb drives, iPods, cameras, printers, CD and DVD drives can be placed in read-only mode or fully disabled, while the endpoint hard drive and all network drives remain accessible and operational. White lists of specifically approved USB devices can be employed.
Application Control: Determines the applications that can and cannot be used, ensuring that only approved applications run on your corporate endpoints. You can create both white lists (allowed applications) and black lists (prohibited applications), and force applications such as a VPN client to run prior to network connection.
Integrity and Remediation: Verifies that designated endpoint antivirus and anti-spyware software is running and is up-to-date, whether the endpoint connects to the corporate network or the Internet. ZENworks Endpoint Security Management takes immediate action if endpoints fall out of compliance by placing them into safe, customizable quarantine states, preventing the spread of viruses or other contamination to the network. Remediation actions can also be initiated, and after compliance is confirmed, endpoints are taken out of quarantine.
Client Self-Defense: Prevents the endpoint security client from being altered, hacked, or uninstalled.
Alerts Monitoring: Ensures that attempts to compromise corporate security policies are reported to the Management Console so that you can promptly remediate the risk. You also get a complete suite of reporting and audit tools to ensure that users are complying with internal security policies and to document compliance of your endpoint security controls with SOX, HIPAA, and other regulatory mandates.
For additional information about these solutions, see the ZENworks Endpoint Security Management technical white paper.
For specific use cases for each of these solutions, see the online ZENworks Endpoint Security Management product introduction.