Delivers real-time protection from malware and other malicious threats

BigFix for Core Protection manages both technology and business risk. It protects physical and virtual endpoints from damage caused by malware and other vulnerabilities and reduces the business disruptions that can result from attacks on endpoints.

  • Protect physical and virtual endpoints from damage caused by viruses, Trojan horses, worms, spyware, rootkits, web threats and their new variants
  • Cross-reference threat information with a large, cloud-based database created by Trend Micro and continuously updated via Trend Micro’s Smart Protection Network™
  • Deliver increased protection through policy enforcement to ensure that antivirus services are always installed, running and up to date
  • Automatically clean endpoints of malware, including processes and registry entries that are hidden or locked

ibm-tem-core-protection-trend-micro-cloud-based

  • Speed on-demand scanning and system start-up times through significant performance improvements
  • Provide security for both fixed, network-connected endpoints and roaming, Internet-connected endpoints
  • Centralize the management of functions that provide advanced antivirus and firewall protection
  • Employ a unified management infrastructure to coordinate among IT, security, desktop and server operations

Data Loss Prevention

The optional Data Protection Add-on for BigFix for Core Protection V8.2 can be deployed and managed through the IBM Tivoli Endpoint Manager infrastructure. The module helps improve data protection capabilities while helping control operational costs.

The Data Protection Add-on for IBM BigFix for Core Protection offers a robust data loss prevention and device control solution that integrates into the antivirus and antimalware capabilities provided by the core protection infrastructure and can:

  • Create and apply policies that limit or prevent the transmission of digital assets through common transmission channels, such as email, to help secure data (sensitive or not) on devices that leave the business premises
  • Create and apply device control policies to regulate access to external storage devices and network resources connected to computers to help prevent data loss which, combined with file scanning, helps guard against security risks
  • Leverage predefined templates to identify, monitor, and optionally block the transmission of sensitive data such as credit card numbers

 

Twitter Feed

OrbData RT @Ronald_vanLoon: [news] @IBM Project EventStore : 1 million ingestions per minute and real time analytics! #BigData #IbmML https://t.co/
OrbData This week the @IBMMiddlewareUC put the spotlight on Orb Data's #IBM champion Pete Meechan. https://t.co/wORYKTE8DV

Address

Address:
100 Longwater Avenue, Green Park, Reading, RG2 6GP, U.K.
Tel:
+44 (0) 118 945 0130
E-Mail:
This email address is being protected from spambots. You need JavaScript enabled to view it.

markerFind on Google Maps

About Us

Orb Data brings together People, Process and Technology to deliver the cornerstone of business success: the management of IT infrastructure. At our heart are our people. We have unrivalled experience, helping us to achieve an enviable reputation for excellence in project delivery. Because we’re independent, we identify actual issues and help organisations resolve them –from spec to deployment, and beyond –providing the right solution in terms of best of breed technology and support. We offer a refreshingly simple approach to the way we conduct business. We take pride in our abilities to provide first class solutions to business problems, and to conduct working relationships with honesty and integrity.

Follow Us On:

JoomShaper