
It prevents data leakage and malware infections that can result from using USB flash drives, Bluetooth devices, CD or DVD players, storage devices, and so on. Device control (Windows desktop and server operating systems only): Device control applies security policies to devices attached to endpoints.
They can also configure data protection rules and define permissions for the use of specific applications.
Content control (Windows workstations only): Content control allows administrators to define traffic scan options and schedule web access while blocking or allowing certain web categories or URLs. Configuration settings include Internet blocking and access by IP address, application, port, or protocol to protect against inbound and outbound threats. Desktop firewall (Windows workstations only): The firewall prevents unauthorized users from accessing users’ computers when roaming or working remotely using unsecured networks.
If it is deemed safe to run, Bitdefender continues to analyze the process while it’s running to identify likely threats that have not yet been reported.
Behavior-based protection: Security for Endpoints stops emerging threats by analyzing the behavior of a given program or process in a virtual environment before it is executed. Antivirus and antispyware: Security scanners can detect and clean viruses and quarantine viruses, spyware, adware, Trojans, and rootkits on all endpoints and servers. You should choose this type only if you have experience with virtualized environments. On-premises: You deploy this console as an appliance that runs in a virtualized environment in your organization’s own infrastructure.
Cloud: Bitdefender hosts this console, and the administrator connects to it with a web browser. When you activate the product, you choose one of two types of console. Control Center provides full visibility into the organization’s overall security posture, insight into global security threats, and control over its security services. Management console: The console, or Control Center, is deployed as an appliance that runs in a virtualized environment.