On the Radar: Trusted Knight protects endpoints and websites

On the Radar: Trusted Knight protects endpoints and websites

  • April 2017 •
  • 6 pages •
  • Report ID: 5048629
Introduction

Protector stops the action of malware rather than its installation, so it can be used to complement traditional antivirus, keeping endpoints safe until malware is removed.

Highlights
Cloud-DMZ protects websites and web applications from exploits such as cross-site scripting (XSS), SQL injection, and remote file inclusion (RFI), as well as distributed denial-of-service (DDoS) attacks.

Features and benefits
Explains Trusted Knight’s approach to endpoint security and how it differs from antivirus.
Explains how Cloud-DMZ works to protect websites.

Key Questions answered
Why is there a need for technology such as Trusted Knight’s in endpoint protection?
Which of its two product lines has greater potential for Trusted Knight?
Industry=Cybersecurity ParentIndustry=ICTAndMedia Date=201704 Publisher=Ovum Price=1000