Total Endpoint Security
Every minute counts in today’s business. Stop wasting your valuable and scarce IT resource time and energy on the selection, testing, planning, deployment, updating and reporting of your Anti-virus software.
Tritons’s Managed Anti-Virus service provides the skilled IT resources, domain expertise, centralised monitoring and management facilities, and proactive approach to ensuring the protection of your desktops and laptops against the ever present threat of viruses, spam and malware attacks.
Benefits of a Managed Anti-Virus Solution
|Fully Managed Solution with Premium Anti-virus providers||We include enterprise class endpoint software, monitored by us 24/7, and managed by a team of technical experts that will provide you with regular reports to ensure you can see that the devices in your business are protected at all times.|
|Reduce Operating Costs||A security incident can stop you from being 100% productive at work. This costs the company a lot of money in lost productivity and in opportunity costs. A virus can hit many machines and take weeks to eradicate. Managing this risk will save you money.|
|Protect Your Company’s Critical Assets and Information||Proactive technologies ensure an additional protection layer against all types of unknown malware, targeted attacks and Internet threats.|
|A Flexible Security Solution||Our advanced security features offer the appropriate security for any size of company and network.|
|Comprehensive Reporting||No longer will you be unsure of how well you are protected. We will provide you with reports monthly that let you know that you are safe.|
|Complete Peace of Mind||Buying an anti-virus solution, installing it, and then relying on everyone to keep it updated is a worry. Now you can rest assured that all your servers, PCs and laptops are always protected and that there is a group of dedicated experts taking care of it for you 24/7.|
A big part of the Triton Networking Technologys philosophy is to provide top-quality products and support. Because of this, we only endorse the products that we believe are the industry’s best. For antivirus, we recommend ESET Endpoint Protection – here’s why.
A Leading Antivirus Solution
ESET is unmatched in its record of stopping in-the-wild viruses in VB100 tests. It has the lowest impact on memory usage and system performance compared to other leading antivirus solutions. This means that unlike other antivirus products, your computer won’t lag whilst a scan is being performed. Endpoint Security runs smoothly on older hardware as well.
Antivirus and Antispyware
ESET’s antivirus and antispyware eliminates all types of threats including rootkits, viruses, spyware and worms to keep you protected whether you’re online or off. ESET has a reputation database meaning they live scan objects to find out if they’re known to be malicious. The optional Cloud-powered scanning functionality utilises ESET’s reputation database for minimal false positives and quicker scanning speeds.
Host-based Intrusion Prevention System (HIPS)
HIPS provides tampering protection and also protects processes, system registry, files and applications from unauthorised modification. You’re able to customise the system behaviour to a granular level and even detect unknown threats based purely on suspicious behaviour.
This allows you to block unauthorised devices and media based on preset parameters or rules. You can set permissions (block, read, read/write) for individual devices, media, groups of users and individual users.
Auto-scan Removeable Media
Automatically scan CDs, DVDs, and USBs for threats when they’re inserted into your machine to eliminate autorun and other removeable risks. You can choose from the following scanning options: do not scan / notify (prompt user) / start automatically.
Protection Across Platforms
Confidently exchange email attachments between Windows, Linux and Mac machines with automatic detection and elimination of malware.
Multiple Log Formats
A log is accessible showing everything the software has done and monitored. You can save logs in multiple different formats including CSV, Windows event log or just plain text. This allows for immediate analysis.