Lumension® Endpoint Management and Security Suite:
Intelligent Whitelisting™

Solution Features

Suite Core Features

Key Solution Features


Integrated Antivirus

  • Identifies and removes all known malware via traditional signature-matching capabilities.
  • Delivers advanced protection via innovative partial signature matching (DNA Matching), hidden malware detection (Exploit Detection) and behavioral analysis (SandBox) techniques.
  • Provides granular AV policy management with CPU throttling. Software Demo:
    In Depth AV Scanning
  • Deploys the latest AV definition files and identifies those endpoints that are not up to date.
  • Detects all new endpoints added since last scan.
  • Works with Lumension® AntiVirus or other 3rd party AV solutions. Software Demo:
    Application Control and AntiVirus - Working Together

Delivers Best of both Antivirus and Application Whitelisting Capabilities

  • Provides additional measure of security before and after an environment is whitelisted.
  • Provides additional layers of defense against zero-day malware through sandboxing and exploit detection technology.
  • Provides fine-grained settings to ensure endpoint performance and user productivity is not impacted by AV scans.
  • Ensures complete protection against all known malware, including viruses, Trojans, rootkits, spyware and adware.
  • Delivers a scalable and efficient defense against well-known and fast-spreading malware.

Integrated Application Control / Whitelisting

Prevents the Execution of Unauthorized Applications

  • Eliminates unknown or unwanted applications in your network, reducing the risk and operational cost of malware, and ultimately improving network stability.
  • Ensures unparalleled application visibility within the endpoint environment.
  • Protects against exploits of un-patched OS and 3rd party application vulnerabilities.
  • Defends against unwanted or malicious applications, including protection against zero-day malware and sophisticated memory-based attacks.
  • Provides additional layer of protection against operational latency in AV definition and patch development and deployment processes.
  • Provides IT with the flexibility to apply granular levels of policy enforcement to users/groups based on business need.
  • Eliminates applications which, while not malware, are not appropriate or authorized for use in your network.
  • Prevents end users from abusing elevated privileges which may result in undesirable configurations, introduction of malware or unwanted software, etc.

Integrated Patch Management

Reduces IT Risk Caused by Known Vulnerabilities

  • Reduces security incidents and strengthens your security posture by programmatically managing your Patch and Remediation process across your entire network, and by ensuring standardized configurations across all assets, including infrequently connected endpoints.

Operationalizes Application Control / Whitelisting

  • Streamlines application whitelist policy management by automatically updating the application whitelist policy with the latest patch hash modifications.

Integration with Lumension® Endpoint Management and Security Suite

  • Common platform suite architecture for all Lumension modules.
  • Discovers both managed and unmanaged devices and deploys agents to any unmanaged assets.
  • Optimized agent-server communications.
  • Unified workflow provides a seamless process to scan the IT environment, remove known threats, lock down endpoints, and flexibly manage change coming into the environment.
  • Customized role-based user interface enables separate functions to work within same workflow process.
  • Streamlined compliance and operational reporting.
  • Integrates with other Lumension product modules in the Lumension® Endpoint Management and Security Suite: patch and remediation, device control, disk encryption and more.

Reduces Endpoint Complexity by Consolidating Point Products

  • Reduces endpoint agent bloat through single extensible architecture.
  • Delivers both pull and push endpoint policy distribution to enable immediate actions on endpoints.
  • Simplifies and optimizes IT operations and security processes with unified console and workflow-based navigation.
  • Improves endpoint performance and reduces endpoint TCO.
  • Improves endpoint visibility across antivirus protection, vulnerabilities, configurations, and device and application policies – for both on-line and off-line machines.
  • Extends security beyond perimeter to include removable devices like USB sticks, CDs / DVDs, and printers.


What is Gartner Saying?

Moving from a Threat Centric to a Trust Centric Endpoint Security Model

Neil MacDonald, VP and Gartner Fellow, examines why organizations should adopt a trust centric approach to endpoint security to address these new challenges.

Get Your FREE Whitepaper

Intelligent Whitelisting – An Intro to More Effective and Efficient Endpoint Security

Instead of trying to build a better anti-virus "mousetrap," security professionals should investigate more innovative approaches to endpoint security.