CA Host-Based Intrusion Prevention System r8 10 User EN CD Win32 CAHIPS8010BPEM Datenbogen

Produktcode
CAHIPS8010BPEM
Seite von 3
to help with compliance, reporting and
investigations
Centralized Policy Management. CA HIPS
offers excellent centrally-managed policy
creation, deployment and maintenance to
make ongoing administration of security
policy across the enterprise easy and
flexible. 
CA HIPS makes it easy to set policies to
apply rules for:
• Lightweight Directory Access Protocol
(LDAP) or Microsoft Active Directory
User Groups  (users, administrators)
• Computer Groups (laptops, servers,
devices)
• Firewall, IDS and IPS Rules and File
Protection 
• Security Levels
The system administrator can determine
the level of access and control applied to
the system, to groups of users or to an
individual user. Even better, the system
administrator can set up a policy that
applies to specific users when they are in
specific roles or locations.  
management and deployment from a
central location via a single, intuitive user
interface to enhance your endpoint
protection.
Behavior-based Real-time Protection
from Known and Unknown Threats.
System administrators can use key
functionality within CA HIPS to learn
system behavior and then create or edit
existing policies to detect anomalies
based on behavior and prevent potentially
malicious activity. This feature helps
ensure service continuity and helps keep
your critical IT assets up and running by
protecting resources and processes. This
also helps the system administrator
customize environments based on
business requirements.
Enterprise-focused Threat Management
Solution. 
IT professionals and network
administrators can now protect against
security breaches and ensure service
continuity by determining what traffic is
appropriate, what applications can
communicate and even what behaviors
and access rights on individual systems
will be allowed or blocked. Centralized
management functions allow for efficient
and effective logging of all relevant events
Data Sheet
2
Fewer Threat Infections Means Reduced
Costs. 
CA HIPS reduces the risk of
downtime by preventing malware,
spyware, adware and rogue software from
gaining access to the network via the
endpoint. By reducing or eliminating the
remediation expenses and help desk
costs associated with successful malware
attacks, CA HIPS helps improve cost and
operational efficiencies. 
Protection from Zero-Day Attacks Helps
Ensure Service Continuity. 
CA HIPS
provides proactive, host-based security
against zero-day attacks. System
administrators can use key functionality
within CA HIPS to learn system behavior
and then create or edit existing policies to
detect anomalies. This feature helps keep
your critical IT assets up and running by
protecting resources and processes in
absence of signature updates. This also
helps the system administrator customize
environments based on business
requirements.
Expands and Complements your Existing
Threat Management Products to Offer
Multilayered Threat Protection. 
Adding
CA HIPS to your existing endpoint threat
defenses will help you prevent known and
unknown threats such as malware,
spyware, adware and rogue software from
penetrating your network. When
combined with your existing anti-virus
and anti-spyware products (such as CA
Anti-Virus or CA Anti-Spyware) you gain
the added capability to detect and
remove threats that may happen to
evade detection.
Distinctive Features and
Functionalities
Three Threat Protection Technologies in
One. 
CA HIPS blends stand-alone firewall
and intrusion detection and prevention
capabilities to provide centralized
proactive threat protection to counter
online threats. This combination offers
superior access control, policy
enforcement, easy intrusion prevention
Figure 1. The CA HIPS Event Viewer