The right technology, at the right time, in the right place

Multi-layered prevention on the endpoint is achieved by uniquely combining three core capabilities of privilege management, application control and content isolation to reduce the attack surface and disrupt the attack chain.

It is this tightly integrated solution that creates solid security foundations, allowing you to contain all internet threats, prevent malware from executing and allow all users to function effectively in the context of a standard user account. Threats are contained and prevented from running, without relying on detection.


Privilege management

Defendpoint privilege management allows you to achieve least privilege by removing admin rights, immediately mitigating 85% of critical vulnerabilities.

  • All apps, tasks and scripts run in the context of a standard user
  • Individual tasks are assigned the privileges they require
  • Replaces UAC prompts with an enterprise class privilege management solution for an improved user experience
  • Defendpoint’s privilege management capabilities make application control easy
More about Privilege management

Application control

Application whitelisting is finally achievable with Defendpoint application control.

  • Privilege management makes application control easy through the removal of admin rights
  • Set a small number of pragmatic rules to allow or block applications
  • Dynamic exception handling for dealing with unapproved applications
  • Contextual application control automatically prevents malware payloads from executing 
More about Application control

Content isolation

With Defendpoint content isolation, all web content, internet downloads and email attachments are automatically isolated so that data is protected from web-based attacks.

  • Utilizes the mature Windows security model to isolate any web-based activity
  • Contain malware infections to prevent data exfiltration, deletion or encryption (e.g. ransomware attacks)
  • Contextual application control automatically prevents payloads from executing when performing isolated activity
More about Content isolation

Ready to find out what Defendpoint can do for you?

Let us show you how Defendpoint's three capabilities uniquely integrate to stop cyber attacks. A consultant will walk you through the software with a short live demo that brings Defendpoint to life.

Complete the short form and we'll be in touch.

Schedule a technical demo
Explore the capabilities

Common threats mitigated with Defendpoint

  • Ransomware
  • Phishing attacks
  • Zero day attacks
  • Pass the hash attacks
  • APTs

Swipe Left

  • All internet threats are contained

    Malicious websites, downloads or attachments are isolated in a sandbox which keeps any malware completely separated from your data.
  • Whitelisting is finally achievable

    Forget complex hash rules or blocking individual applications. Take a pragmatic approach that trusts the build, with broad whitelisting rules.
  • Fully customizable end user messaging

    Replace Windows UAC prompts with more contextual messages to give users more flexibility and improve the overall experience.
  • Simple, familiar policy design

    Firewall-style rules and a simple management console makes Defendpoint easy to use, maintain and scale across thousands of users.
  • All users run without admin rights

    Remove excess privileges and mitigate 85% Critical Microsoft vulnerabilities immediately, without impacting the end user experience.
  • See it live

    Watch this short video to see Defendpoint in action on the endpoint.

What Defendpoint will do for you

Defendpoint creates the foundation of your security architecture. By uniquely combining the three technology capabilities of privilege management, application control and content isolation, Defendpoint protects your users, data and environment from attack.

  1. Stop ransomware attacks
  2. Stop social engineering
  3. Stop zero day attacks
  4. Stop insider threats

Stop ransomware attacks

The scenario

A user opens a document attached to a phishing email, which could be labelled as an invoice spreadsheet or word document invoice. Malware runs when the document is opened and the user is hit with a ransom demand to gain access to their files, which are now encrypted.

The solution

When a user is tricked into opening a malicious document, Defendpoint seamlessly isolates the attack from the user’s data and any attempts to launch payloads or persist are blocked. The malware is stopped, your data is not exposed and the threat cannot persist.
Read more about ransomware

Without Defendpoint

With Defendpoint

Stop social engineering

The scenario

Attackers typically use email to demand personal information, with emails appearing to be from legitimate sources. Content appears to be legitimate and through the use of personal information, appears to be relevant in order to entice the user into clicking the link. The attacker’s script is then run and a malware payload is launched. Attacks are often unique and highly targeted.

The solution

Defendpoint stops phishing and other forms of social engineering attack by combining proactive capabilities that reduce the attack surface and disrupt the attack chain. Defendpoint isolates untrusted content in a secure environment with no access to user data or privileges so that data can’t be encrypted or stolen.
Read more about social engineering

Without Defendpoint

With Defendpoint

Stop zero day attacks

The scenario

Criminals pose as advertisers and submit malicious adverts to the internet. These ads are displayed on legitimate sites and wait for a user to click. Malware embedded in the advert exploits unpatched vulnerabilities in applications such as Java and Flash. The payload drops and hackers gain access to files and data.

The solution

Defendpoint allows you to create solid foundations and protect the operating system in the time between a vulnerability being discovered, and a patch being released and rolled out. Taking a proactive approach to security keeps you a step ahead, with three capabilities working together to protect your data from attack.
Read more about zero days

Without Defendpoint

With Defendpoint

Stop insider threats

The scenario

An insider attack is usually caused by the accidental or malicious abuse of user privileges to gain access to valuable data. Admin privileges can be used to disable security settings and bypass controls, making them a high target for attackers. Insider breaches can also occur when highly privileged users such as sysadmins or contractors are tricked into revealing login credentials and opening the door to your private information.

The solution

Defendpoint protects you from insider threats, whether malicious or accidental. By removing admin rights you ensure that users have only the necessary privileges to perform their specific job roles - without affecting productivity. Content isolation prevents web based attacks that target users, while application control allows you to keep a handle on the specific applications being introduced into your environment.
Read more about insider threats

Without Defendpoint

With Defendpoint