For more information and support on COVID-19 please visit www.sacoronavirus.co.za.

Business Endpoint Security

With online threats only becoming more complex and evasive, a traditional Endpoint security solution is no longer enough on its own. At Vox, we offer traditional Endpoint security with the added advantage of Endpoint detection and response (EDR). This crucial functionality is integrated into our event management platform (SIEM) as a Managed Service, which, along with computer security incident response team (CSIRT) services, means you’ll always be proactively protected by a cybersecurity solution that can handle any incident that may arise.

Our Business Endpoint Security features include:

• Endpoint protection for Windows, Linux, Mac and mobile devices.
• Anti-malware, vulnerability management, disk encryption, data leak protection, mail and web security and more.
• Integrated Sandbox, with alerting and reporting functions from a central manager.
• Effective threat monitoring and detection using best of breed technologies.
• Rapid/automatic response to attacks based on Indicators of Compromise (IoC) scans or ‘single click’ options.

How It Works

Features And Benefits

  • Full scope threat visualisation

    By seeing security alerts on your Endpoints, you'll be able to analyse them further to understand the breadth and depth of the threat and eliminate it in full, right from the start.

  • Simplified workflows

    Enjoy streamlined workflows from a single console, available both on-premise and in the cloud, combined with simple EDR scenarios and controls, including drill-down visualisation, IoC scanning and response options that don’t require too much cybersecurity expertise or time.

  • Enriched alert data

    Endpoint Protection with EDR enriches incidents with necessary information and helps you understand the connections between different events through attack spread path visualisation.

  • Customised threat response

    Choose between automated responses for threats discovered across all Endpoints based on IoC scans or respond immediately to incidents upon discovery with ‘single-click’ options, including: ‘isolate host’, ‘quarantine file’, ‘launch scan of the host’ and ‘prevent file from executing’.

  • Managed Services

    Our Managed Services for Endpoint security will help to proactively stop incidents before they become problems. They’ll also provide reporting over selected periods and advise where improvements or changes need to be made to prevent further issues.

  • Computer security incident response team services

    CSIRT services assist in resolving an incident as quickly as possible by preventing further spread of the incident as well as tracking the source of the attack and, hopefully, the threat actors.

Frequently Asked Questions

The Endpoint refers to your PC, mobile device, server or storage solution and is basically where data resides and where most of the work is done. This makes Endpoint security an important last line of defense to protect your data from malware, ransomware, vulnerability exploitation, phishing attacks and more.

We offer a range of Endpoint security products to choose from, from traditional Endpoint protection tools to advanced Endpoint detection and response solutions. The option for you to add on Managed Services and incident response services for Endpoint security allows us to provide a comprehensive Endpoint security solution like no other.

Absolutely – you can start off with traditional Endpoint protection software and add more products to the solution as your needs arise.

Yes – we offer Vox Business Endpoint Security products and services in 12 month bundles.

Content Hub

Vox 4 Thought
South African Firms Will Soon Feel the Full Impact of Data Breaches
Vox 4 Thought
Every Company’s Cyber Security Must-Haves
These four elements are non-negotiable when it comes to keeping your business safe from cyber harm. We’ve optimised them even further.
Vox Level 1 Security Offering Defence Against Ransomware | Vox Cyber Security | illustration png
Vox 4 Thought
It’s Time to Get Proactive About Data Protection
Knowing where your data is stored and who has access to it is absolutely crucial for doing business in the age of data privacy regulation.
Data Privacy Regulation | Vox Security Level 3 | Vox Cyber Security | computer screen image
Vox 4 Thought
Navigating Internet Usage and Safety Against Digital Predators

Other Recommended Products

Mimecast Mimecast

Say goodbye to the frustration and downtime of managing an assortment of disparate emai...

Find out more

Firewalls Firewalls

To keep your local network safe, and your company information and resources private and...

Find out more

Backup Backup

If you are a small business or a large enterprise, anything that compromises your data ...

Find out more

Vox Cybersecurity Portal Vox Cybersecurity Portal

As cybercrime increases both in South Africa and across the world, it is becoming incre...

Find out more

Please include an “@” in the email address. “joesoap.co.za is missing an ”@”.

Show Incorrect password

Forgot your password?

Lost your password? Please enter your email address. You will receive a link to create a new password.

Error message here!

Back to log-in

Close