What other functionality except detecting threats is available in F-Secure Elements Endpoint Detection and Response?
Aside from detecting threats based on system and network behaviors as well as events, F-Secure Elements Endpoint Detection and Response provides system administrators the visibility of all applications that are launched (not limited to installed applications) in the managed IT environment with the Application Inventory feature.
The feature utilizes F-Secure's reputational data that allows you to list all harmful or otherwise unwanted applications and cloud services, and foreign destinations of those applications with questionable reputation. You can easily restrict potentially harmful applications and cloud services even before data breaches happen.
Application Inventory lists the following information about devices and applications:
- Devices: Importance, host names, IP address, Company name, number of detection per host, OS distribution, client version used
- Application: Most used, harmful, potentially unwanted, unknown
- Application Reputation: Safe/Harmful/Potentially unwanted/Privacy risk
- Application version