MENU

Endpoint Security

SSS offers a range of products that will fit your needs and budget, available for consumption on site, managed, or through the cloud.

Ransomware, zero-day threats, and other malicious activity often starts at your endpoints.

Endpoint security solutions needs to be able to:

  • prevent known bad files, applications and behaviours
  • detect zero-day threats
  • provide adequate protection from ransomware
  • collect information that can be used to investigate potential breaches

Our partner Sophos has a simple to manage solution that provides the best protection across all of these areas. 

We have many years experience in Endpoint Security

SSS has been working with Endpoint security products for over 25 years and Mobile Security products for over 15.

We have proven abilities in this space; being on of only a few Sophos Platinum partners in New Zealand and the top partner in New Zealand for many years running.

Our engineers are highly trained and experienced in helping organisations deploy and manage these solutions, and have particular experience in assisting large and complex organisations.

Want to know more?

Read more about these solutions in the section below.

Contact us on 04 917 6670 or sales@sss.co.nz if you would like to know more about these solutions and how they can help you.

Request more information3

securityproducts section Solutions + Partners

  • Asset Discovery, Management, and Control

    Forescout Technologies is the leader in device visibility and control.

    Forescout Technologies is the leader in device visibility and control. Their unified security platform enables enterprises and government agencies to gain complete situational awareness of their extended enterprise environment and orchestrate actions to reduce cyber and operational risk.

    Forescout can assist you with:

    • Device visibility
    • Asset Management
    • Device compliance
    • Network access control
    • Network segmentation
    • Incident response

    Contact us on 04 917 6670 or sales@sss.co.nz if you would like to know more about how Forescout can help you with asset discovery, management, and control.

    Request more information3   Request a demo

    The Forescout platform provides organisations with complete situational awareness of their extended enterprise and the ability to orchestrate actions to reduce cyber risk.

    Forescout products deploy quickly with agentless, real-time discovery and classification of every IP-connected device for continuous posture assessments.

    Read more about the Forescout products below:

    Jump to:


    Forescout eyeSight

    Forescout eyeSight provides device visibility across your extended enterprise.

    • Discover - uses over 20 passive and active monitoring techniques to discover managed and unmanaged devices connecting to your heterogeneous network infrastructure.
    • Classify - auto-classifies traditional, IoT, and OT devices using a multi-dimensional classification technology to identify device function, type, operating system (including version), vendor, and model.
    • Assess - continuously monitors the network and assesses the configuration, state, and security of connected devices to determine their compliance posture and risk profile.

    Highlights

    • Agentlessly gain a unified, real-time inventory of network-connected devices.
    • Accurately profile devices to gain the required context for building proactive security and compliance policies.
    • Identify rogue, vulnerable, or noncompliant devices and build policies to limit risk.
    • Gain real-time assurance that security tools and compliance controls are working.
    • Efficiently measure and report compliance posture and cyber risk exposure.
    • Automate common tasks to minimise human error and increase efficiency.

    Benefits

    • Agentless visibility.
    • Passive profiling.
    • Continuous monitoring.
    • Complete asset inventory.

    Click here to download the Forescout eyeSight datasheet.

    Forescout eyeSight datasheet image for downloadBack to Top

    Forescout eyeSegment

    With Forescout eyeSegment, you can accelerate your network segmentation to reduce risk across your extended enterprise. Through real-time visualisations and proactive policy simulations, Forescout both enables segmentation controls across diverse enforcement technologies and validates expected outcomes.

    • Map traffic flows to logical taxonomy of users, applications, services, and devices.
    • Build, refine, and stimulate logical segmentation policies to learn impact before enforcement.
    • Monitor segmentation hygiene in real time and respond to policy violations across the extended enterprise.

    Highlights

    • Create context-aware segmentation policies using a logical business taxonomy of users, apps, services, and devices.
    • Quickly learn the impact before enforcing segmentation policies.
    • Continuously monitor and validate segmentation hygiene.
    • Rapidly respond to segmentation policy violations across the extended enterprise.

    Benefits

    • Accelerate network segmentation projects with confidence.
    • Proactively determine the impact of policies to minimise business disruption.
    • Reduce risk of business disruption.
    • Uniformly enforce control across diverse enforcement technologies and network domains through a single policy framework.
    • Adapt to compliance and regulatory requirements.
    • Reduce operational complexity of segmentation projects.
    • Enable a Zero Trust approach to implement granular security controls.

    Click here to download the Forescout eyeSegment datasheet.

    Forescout eyeSegment datasheet for downloadBack to Top

    Forescout eyeControl

    Forescout eyeControl enforces and automates policy-based network and host controls through integrations with heterogeneous physical and virtual network infrastructure.
    Actions can be automated or administrator-initiated, and gradually increased to minimise disruption while reducing manual effort to:

    • enforce network access
    • improve device compliance
    • implement network segmentation
    • accelerate incident response.

    Highlights

    • Protect sensitive data against external threats.
    • Prevent infected, vulnerable, or noncompliant devices from spreading malware.
    • Prevent targeted attacks from stealing data or forcing network downtime.
    • Help ensure network access and availability to employees, contractors, and customers.
    • Enforce compliance with internal policies and external regulations.
    • Automate control actions to provide the right action(s) for each situation.

    Benefits

    • Enforce network access.
    • Segment dynamically.
    • Improve device compliance.
    • Accelerate incident response.

    Click here to download the Forescout eyeControl datasheet.

    Forescout eyeControl datasheet for downloadBack to Top

    Forescout eyeManage

    Forescout eyeManage provides centralised configuration, management, and monitoring of Forescout deployments across the extended enterprise. It also unifies asset, compliance, and risk reporting across IT and OT networks for cross-functional stakeholders, audit teams, and executives.

    Highlights

    • Unify device inventory across campus, data center, cloud, IoT, and OT.
    • Search and drill down from a centralised asset view.
    • Automate IP distribution, software upgrades, and backups.
    • Expand deployment simply with zero-touch provisioning of new appliance.
    • Use pre-configured dashboards to quickly share visibility and compliance progress with executives.
    • Empower security operation with real-time snapshots of device posture.
    • Scale to 2M devices regardless of where those devices are deployed.
    • Centralise administration of licenses across the extended enterprise.

    Benefits

    • Unified device inventory.
    • Policy-based control actions.
    • Centralised configuration.
    • Risk posture monitoring.

    Click here to download the Forescout eyeManage datasheet.

    Forescout eyeManage datasheet for downloadBack to Top

    Forescout eyeExtend

    Forescout eyeExtend products share device context between the Forescout platform and other IT and security products to automate policy enforcement across disparate solutions and accelerate system-wide response to mitigate risks.

    eyeExtend can improve your existing investments and processes in the following technology areas:

    • Advanced Threat Detection - provides security orchestration between the Forescout platform and your advanced threat detection system.
    • Client Management Tools - provides visibility and control across your network-connected devices, including corporate devices, while they're off the enterprise network.
    • Enterprise Mobility Management - facilitates policy-based orchestration between the Forescout platform and leading EMM systems to help you unify security policy.
    • Endpoint Protection, Detection, and Response - provides bi-directional integration between the Forescout platform and leading endpoint security platforms to let you verify device compliance.
    • IT Service Management - helps maintain a complete and accurate ServiceNow asset repository for all times.
    • Next-Generation Firewall - enables you to implement dynamic network segmentation, automate controls for secure access to critical resources, and create context aware security policies within your next-generation firewalls.
    • Privileged Access Management - provides you with real-time agentless visibility into undiscovered local privileged accounts and lets you automate responses to threats.
    • Security Information and Event Management - facilitates information sharing and policy management between the Forescout platform and leading SIEM systems to improve situational awareness and mitigate risks using advanced analytics.
    • Vulnerability Assessment - shares comprehensive vulnerability assessment data between the Forescout platform and leading vulnerability assessment systems.
    • eyeExtend Connect- allows customers, systems integrators, and technology vendors to easily integrate custom applications, security tools, and management systems with the Forescout platforms.
    • Advanced Compliance Module - automates on-connect and continuous device configuration assessment to comply with security benchmarks.

    Back to Top

    Forescout eyeRecover

    Forescout eyeRecover provides automated failover, resiliency, and service continuity for Forescout deployments with a choice of active / standby high availability pairing or failover clustering capabilities.

    Highlights

    • Provide resiliency and high availability for Forescout deployments.
    • Reduce risk of business disruption and downtime.
    • Protect against system, network, or site-wide failures.
    • Help meet IT service continuity mandates.
    • Automate failover and intelligent reallocation of workloads.
    • Enable cross-site failover for disaster recovery scenarios.
    • Perform manual failover to facilitate maintenance procedures and upgrades.
    • Support centralised and distributed Forescout deployments.

    Click here to download the Forescout eyeRecover datasheet.

    Forescout eyeRecover datasheet for downloadBack to Top 

  • OT Security

    Today’s OT and ICS networks depend on digital systems to carry out daily operations, opening them up to new cyber and operational risks.

    Today’s OT and ICS networks depend on digital systems to carry out daily operations, opening them up to new cyber and operational risks. Forescout Technologies is the leader in device visibility and control and they have the technology to help you manage your OT security.

    Want to know more?

    Contact us on 04 917 6670 or sales@sss.co.nz if you would like to know more about how Forescout can help you with your OT security needs.

    Request more information3   Request a demo

    How Forescout can help you

    In-Depth OT Network Visibility

    • Passively establish complete asset inventory with full device fingerprinting
    • Instantly assess common vulnerabilities & exposures (CVEs) for each asset
    • Document network baseline of normal communications
    • Reduce analyst workload with automatic, impact-based security & operational risk scoring

    Real-time Threat Detection

    • Patented deep packet inspection (DPI) of 130+ protocols down to process values
    • Built-in checks for 2,400+ ICS-specific threat indicators
    • Interactive visualisations of threats and risks
    • Continuous, configurable policy and behavior monitoring

    24/7 Comprehensive Support

    • Global team of 100+ to quickly respond to customer needs
    • Only OT network monitoring vendor offering 24/7 support
    • Custom scripts on-the-fly to detect emerging threats
    • Flexibility to submit a ticket or chat live with a cyber resilience expert

    Forescout SilentDefense provides instant cyber resilience for OT infrastructure

    • Enables passive, real time network monitoring of OT and ICS networks.
    • Provides non-intrusive active technology, ICS Patrol, to deliver deeper asset visibility.
    • Saves time, improves SOC and analyst effectiveness and automates risk analysis with the Asset Risk Framework.
    • Displays key operational status of multi-site OT and ICS networks on a single pane of glass with the Enterprise Command Center (ECC).
    • Increases threat discovery capabilities and reduces the mean time to respond (MTTR) to cyber physical threats.
    • Extends the exceptional device visibility, classification and profiling capabilities of the Forescout platform from campus to OT.


    Click here to download the SilentDefense datasheet

    Forescout SilentDefense Datasheet for download

    Click here to read the Forescout Solution Brief.

    Forescout Solution Brief for download



  • Endpoint Security

    We offer you state of the art endpoint security solutions delivered and supported by our team of experts to protect your endpoints from today's and future threats .

    We offer you state of the art endpoint security solutions delivered and supported by our team of experts to protect your endpoints from today's and future threats . We have partnered with Sophos who offer world class security that is simple to manage.

    The Sophos endpoint security solution is managed by Sophos Central, the cloud interface that manages all of your Sophos security solutions.

    Jump to:

    Contact us on 04 917 6670 or sales@sss.co.nz if you would like to know more about our how Sophos Intercept X can help protect your endpoints.

    Request more information3   Request a demo

     

    Sophos Intercept X

    Sophos Intercept X employs a comprehensive defence-in-depth approach to endpoint protection rather than simply relying on one primary security technique.

    • Modern techniques include deep learning malware detection, exploit prevention, and anti-ransomware specific features.
    • Foundational techniques include signature-based malware detection, behaviour analysis, malicious traffic detection, device control, application control, web filtering, data loss prevention, and more.

    Deep Learning Malware Detection

    The artificial intelligence built into Intercept X is a deep learning neural network, an advanced form of machine learning that detects both known and unknown malware without relying on signatures.

    Stop the Exploit, Stop the Attack

    Exploit prevention denies attackers by blocking the exploit tools and techniques used to distribute malware, steal credentials, and escape detection. This allows Sophos to ward off evasive hackers and zero-day attacks in your network.

    Proven Ransomware Protection

    Intercept X uses behavioral analysis to stop never-before-seen ransomware and boot-record attacks, making it the most advanced anti-ransomware technology available. Even if trusted files or processes are abused or hijacked, CryptoGuard will stop and revert them without any interaction from users or IT support personnel. CryptoGuard works silently at the file system level, keeping track of remote computers and local processes that attempt to modify your documents and other files.

    Back to Top

    Sophos Intercept X Advanced with EDR

    Sophos Intercept X Advanced with EDR consolidates powerful endpoint detection and response (EDR) with unmatched endpoint protection.

    EDR starts with the strongest protection

    Intercept X consolidates the world's best endpoint protection and EDR into a single solution. Intercept X Advanced with EDR provides additional cyber security assurance with the ability to detect, investigate, and respond to potential security threats.

    Add expertise, not headcount

    • Automatically detect, prioritise, and investigate threats using artificial intelligence.
    • Out-of-the-box queries that are designed for practitioners, by practitioners. Queries can easily be edited for custom searches, built from scratch, or sourced from our community.
    • Intercept X Advanced with EDR replicates the tasks normally performed by skilled analysts, so organisations can add expertise without having to add staff.

    Built for threat hunting and IT operations

    Sophos Intercept X Advanced is the first EDR solution designed for IT administrators and security analysts. It allows you to ask any question about what has happened in the past, and what is happening now on your endpoints.

    Back to Top

    Managed Detection and Response

    The Sophos Managed Threat Response (MTR) service provides 24/7 threat hunting, detection, and response delivered by a team of experts as a fully managed service. 

    Back to Top 

  • Mobile Security

    Sophos Central Mobile is a secure Unified Endpoint Management (UEM) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints.

    Sophos Central Mobile is a secure Unified Endpoint Management (UEM) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. It is one of the products that you can manage with the Sophos Central interface.

    • Productivity - Let mobile users work the way they want, on whatever devices they want - securely.
    • Security - Ensure business data doesn't go adrift and isn't threatened by malware.
    • Simplicity - Easy to configure, manage, and maintain.
    • Value - User-based pricing lets you manage and secure endpoints affordably.

    Contact us on 04 917 6670 or sales@sss.co.nz if you would like to know more about how Sophos can assist you with your mobile security.

    Request more information3   Request a demo

    • Simple unified endpoint management
    • Modern management with Mobile Threat Defence
    • Keep business data protected and personal data private
    • Remote configuration and setup
    • Productivity - let your users work on any device they want
    • Security - for users, data, and devices
    • Simplicity - easy to configure, manage, and maintain
    • Value - secure your mobile devices affordably
    • Powerful containers
    • Manage mobile content without managing devices

    Sophos Secure Email

    Sophos Secure Email is a fully-featured, secure, and containerised personal information management (PIM) app for Android and iOS that lets you isolate information like business email, calendars, and contacts from private data on the mobile device. You can easily revoke business access based on device compliance rules.

    Sophos Intercept X for Mobile

    Intercept X for Mobile monitors device health continuously to ensure that you are notified if a device is compromised and can take remediating action or automatically revoke access to corporate resources. Sophos Intercept X for Mobile for iOS and Android also includes a password safe, secure QR code scanner, and authenticator for one-time passwords.

    Sophos Secure Workspaces

    Sophos Secure Workspaces is a containerised mobile content management app for iOS and Android that provides a secure way to manage, distribute, and edit business documents and view web content. Edit Office format documents without leaving the container environment to ensure encrypted content remains secure.

    Click here to download the Sophos Mobile datasheet.

    Sophos Mobile Datasheet for download 

     

  • Server Security

    Secure your cloud, on-premises, or hybrid server environments with Sophos Central Intercept X.

    Secure your cloud, on-premises, or hybrid server environments with Sophos Central Intercept X.

    Sophos Intercept X provides an automated server threat detection and response. It enables you to control what you can and can't run, so your server configurations stay safe and secure.

    Intercept X for Server delivers protection that is top-rated by industry experts, combining server-specific features to create a comprehensive defence-in-depth solution.

    • Stop unknown threats - Deep-learning technology is an advanced form of machine learning that detects malware even when it has never been seen before.
    • Don't get held to ransom - Anti-ransomware
    • Block server exploits - Exploit techniques are commonly used to break into organisations' servers. Intercept X for Server uses exploit prevention to stop these dangerous attacks.
    • Deny hackers - Stop real-world hacking techniques used for credential harvesting, lateral movement, and privileged escalation.

    Contact us on 04 917 6670 or sales@sss.co.nz if you would like to know more about our how Sophos Intercept X can help protect your servers. 

    Request more information3   Request a demo

    Endpoint Detection and Response (EDR) for Servers

    Ask and answer detailed IT operations and threat-hunting questions across your entire server estate. Quickly find vulnerabilities such as remote desktop protocol being unnecessarily enabled and hunt down suspicious activity such as processes attempting to connect on a non-standard port.

    • Answer critical IT operations and threat-hunting questions
    • Quickly scan your entire server estate
    • Remediate issues fast

    Automatically Detect Insecure Deployments

    See and secure your entire multi-cloud inventory. With Intercept X Advanced for Server with EDR you can detect your cloud workloads as well as critical cloud services like S3 buckets, databases, and serverless functions; identify suspicious activity or insecure deployments; and expose any security gaps.

    • Detailed multi-cloud inventory
    • AI-powered anomaly detection
    • Automated assessment of your environment

    Features

    Dashboard Overview

    • See your entire server estate, including hybrid and cloud deployments
    • Dive into threat cases, reports, and your servers with a single click
    • Access policies and settings from a single screen
    • Quickly download deployment agents

    Policy Management

    • Create policies for threat protection, and for application, peripheral, and web control
    • Apply them across your entire server estate in just a few clicks
    • Policies can also be configured individually for servers if required

    Server Lockdown

    • Protect your server configuration in one click
    • Only apps approved by you can run
    • No downtime required

    Simple Deployment

    • Quickly access the deployment agent for physical, cloud, or virtual deployments

    Click here to download the Sophos Intercept X for servers datasheet.

    Sophos Intercept X Advanced for Server with EDR

    Click here to download the Sophos Application Whitelisting datasheet.

    Sophos Application Whitelisting datasheet for download 

     

  • Application Whitelisting

    Thycotic's Privilege Manager is the most comprehensive least privilege and application control solution.

    Thycotic's Privilege Manager is the most comprehensive least privilege and application control solution. It is capable of supporting enterprises and fast-growing organisations at cloud scale.

    Thycotic Privilege Manager empowers you to implement a least privilege security posture and implement application control on endpoints. This minimises the risks caused by cyber attacks without disrupting end-users.

    Thycotic Privilege Manager is available as an on premise or a cloud solution.

    Contact us on 04 917 6670 or sales@sss.co.nz if you would like to know more about how Thycotic Privilege Manager can help you with application whitelisting.

    Request more information3   Request a demo

     Secure your largest attack surface

    • Automatically remove all admin credentials from domain and non-domain endpoints.
    • Elevate applications with policy-based controls.
    • Prevent malware and insider threats from exploiting privileged local credentials on endpoints.
    • Supports Windows XP SP3 or newer and MacOS 10.11 (ElCapitan) or newer.
    • Deploy at cloud speed and scale.

    Deploy rapidly with no hardware or infrastructure requirements and rapid configuration

    • Scale deployments elastically within flexible architecture.
    • Manage thousands of machines with built-in application control, real-time threat intelligence, and actionable reporting.

    Implement least privilege enforcement

    • Remove excess privileges and permanently control which accounts are members of any local group.
    • Continuously discover endpoints, applications, and processes tied to privileged accounts.
    • Check policies and execute application control 24/7.
    • View actionable reporting through a single, streamlined dashboard.

    Control your applications

    • Create granular application control policies for whitelisting, blacklisting, and graylisting.
    • Elevate application without requiring admin credentials or IT support.
    • Allow people to use applications and controls they need to do their jobs, without requiring local admin rights.

    Benefits of using Privilege Manager

    • Improve your security.
    • Unburden your IT teams.
    • Meet compliance mandates.
    • Scale your PAM.