We then selected ten known phishing pages from PhishTank (Opens in a new window), a collection of suspected and verified phishing websites. Vipre detected and blocked all ten. We started Vipre off in the usual manner, namely by testing its anti-phishing capabilities. We first ensured that malicious URL blocking for HTTP and HTTPS traffic was on. To apply any configured policy, you can navigate to Devices, pick the device you want to change, and then click the current policy name. You can then assign the new policy and it takes effect immediately.Ĭheck here for a breakdown of how we test endpoint protection platforms. Unfortunately, there is no ability to enforce BitLocker encryption, as you can with ESET Endpoint Protection Standard, among others. This is in addition to SSL traffic scanning, similar to BitDefender GravityZone. One exception was that the firewall is off by default since Windows Firewall is sometimes preferred, but that’s the only thing we needed to turn on to test. Enabling the firewall is also necessary for the intrusion detection system (IDS) to function, which could surprise you if you expect certain kinds of threats to be caught automatically.ĭomain name server (DNS) protection is also handy because it works at the kernel level of the OS to swat down attempts to contact domains with known threats. For example, it doesn’t rely on a browser plugin like F-Secure Elements. Nearly all of the default settings are ideal for most environments. You can clone the default policy and make changes as needed. This could be a minor annoyance, depending on how many policies you need to define. You can assign separate policies to laptops, workstations, and servers, which we thought was a clever way to save time.Įditing policies is a snap. To configure additional policies, you navigate to the Policies section and click on either macOS or Windows. We have mixed feelings about this separation. While F-Secure Elements calls out policy elements that only apply to specific platforms, Vipre separates them completely. A quick run of the installer gets you ready for action. This is handy for pushing installs out to large numbers of devices of a similar type. Alternatively, you can create a custom installer that automatically applies a policy of your choosing. When you navigate to Deploy > Download Installer, you receive an executable that will install the agent with the default security policy. The menus are task-based, descriptive, and displayed cleanly along the left-hand side of the screen. Vipre’s UI has undergone minor visual improvements since last we reviewed it, but it has always had an easy-to-use and mobile-ready interface. You don't need to buy it through a channel partner, and you can get a one-year subscription starting at $150 for five seats, with modest discounts as you increase your volume. Unlike some entries in our roundup, Vipre Endpoint Security Cloud has very straightforward pricing. Vipre Endpoint Security Pricing and Plans (Editors' Note: Vipre is owned by Ziff Davis, the parent company of .) ![]() But if your shop doesn't mind exchanging a few high-end features for a good price and an easy learning curve, Vipre may be just what you're looking for. However, it's still behind its competitors in threat analysis and endpoint detection and response (EDR) capabilities and it lacks agents for Linux, iOS, or Android. These issues keep Vipre behind our Editors' Choice winners in the endpoint security category, a list that includes Bitdefender GravityZone Ultra, F-Secure Elements, and Sophos Intercept X Endpoint. Vipre Endpoint Security Cloud is an easy-to-use and scalable business endpoint protection suite that's also highly effective at finding threats. How to Set Up Two-Factor Authentication. ![]() How to Record the Screen on Your Windows PC or Mac.How to Convert YouTube Videos to MP3 Files.How to Save Money on Your Cell Phone Bill.How to Free Up Space on Your iPhone or iPad. ![]() How to Block Robotexts and Spam Messages.
0 Comments
Leave a Reply. |