F secure linux security

F-Secure Linux Security 64

Разработчик: F-Secure (Финляндия)
Лицензия: Пробная 30 дней
Цена:
Версия: 3.0.7
Обновлено: 2021-08-29
Системы: Linux (i686, x86_64)
Интерфейс: английский
Рейтинг:
Ваша оценка:
Категория: Антивирусы для Linux
Размер: 8 MB (онлайн-установка)

О программе

Что нового

Новое в версии F-Secure Linux Security 64 :

Чтобы установить Linux Security 64, вам сначала нужно создать установочный пакет с помощью Policy Manager, а затем использовать этот установочный пакет для установки продукта на целевой машине.

  • Новая платформа сканирования
  • Улучшено средство проверки целостности
  • Централизованное управление с помощью портала PSB
  • Централизованное управление с помощью диспетчера политик
  • Оповещения диспетчера политик
  • Поддержка распространения и установки с помощью диспетчера политик
  • Поддержка автономных и изолированных развертываний с помощью установочного пакета PM 14.30 и выше
  • Поддержка установки определенных версий продукта (требуется PM 15.10 или выше)

Системные требования

Системные требования:

  • Процессор: Intel i686 совместимый
  • Оперативная память: 1024 MB
  • Диск: 3 GB свободного места
  • Рекомендуется иметь достаточный объем файла подкачки.

Программные требования:

  • Linux kernel 2.6 и выше
  • glibc 2.5 и выше
  • 32-bit совместимые библиотеки для дистрибутивов 64-bit

Дистрибутивы (32-bit):

  • CentOS 6.7, 6.8, 6.9, 6.10
  • Debian 7.10, 7.11
  • Debian 8.5, 8.6 *
  • Debian 9.2, 9.3, 9.4
  • Oracle Linux 6.7, 6.8, 6.9 RHCK и UEK **
  • RHEL 6.7, 6.8, 6.9, 6.10
  • SUSE Linux Enterprise Server 11 SP3, SP4
  • Ubuntu 14.04.4, 14.04.5
  • Ubuntu 16.04, 16.04.1, 16.04.2, 16.04.3, 16.04.4

Дистрибутивы (64-bit):

  • Amazon Linux 2017.03, 2017.09, 2018.3
  • CentOS 6.7, 6.8, 6.9, 6.10,
  • CentOS 7.1-1503, 7.2-1511, 7.3-1611, 7.4-1708, 7.5-1804 ***
  • Debian 7.10, 7.11
  • Debian 8.5, 8.6 *
  • Debian 9.2, 9.3, 9.4
  • Oracle Linux 6.7, 6.8, 6.9 RHCK и UEK **
  • Oracle Linux 7.2, 7.3, 7.4, 7.5 RHCK и UEK **
  • RHEL 6.7, 6.8, 6.9, 6.10
  • RHEL 7.2, 7.3, 7.4, 7.5 ***
  • SUSE Linux Enterprise Server 11 SP3, SP4
  • SUSE Linux Enterprise Server 12, 12 SP1, 12 SP2, 12 SP3
  • Ubuntu 14.04.4, 14.04.5
  • Ubuntu 16.04, 16.04.1, 16.04.2, 16.04.3, 16.04.4
  • Ubuntu 18.04, 18.04.1 ****

*) Сканирование при доступе не поддерживается в Debian 8, поскольку в его конфигурации ядра функция fanotify включена только частично.

**) RHCK: Red Hat Compatible Kernel, UEK: Unbreakable Enterprise Kernel

***) Сканирование при доступе поддерживается в RHEL / CentOS 7.x только с текущим обновлением ядра (kernel-3.10.0-327.36.1.el7 или новее), которое исправляет критическую ошибку в подсистеме fanotify.

****) Брандмауэр не совместим с Ubuntu 18.04 и Ubuntu 18.04.1. Мы рекомендуем отключить брандмауэр и использовать службу брандмауэра, которая предоставляется вместе с операционной системой.

Полезные ссылки

Подробное описание

F-Secure Linux Security предлагает готовую систему безопасности с возможностью сканирования в режиме реального времени, вручную и по расписанию. Антивирусное решение доступно для установки в полном режиме или только в режиме командной строки. 30-дневный ознакомительный период позволяет воспользоваться всеми функциями полной версии.

Читайте также:  Включить режим безопасности для windows 10

Автоматическое антивирусное сканирование в режиме реального времени, обеспечивает защиту системы и препятствует распространению вирусов по сети. Брандмауэр блокирует вирусные и хакерские атаки, защищая ваш сервер от злоумышлиников и сетевых червей.

Кроме того, функция предотвращения вторжений не позволяет использовать известные уязвимости, изменять важные системные файлы или сохранять нежелательные файлы на корпоративных серверах.

Интегрируясь с централизованными системами управления F-Secure, Policy Manager или PSB, антивирус автоматически уведомляет администраторов о любых угрозах безопасности или вирусной активности. Администраторы могут изменять различные политики безопасности с помощью диспетчера политик.

Основные функции F-Secure Linux Security

  • Защита сети от угроз для Windows и Linux
  • Постоянная защита в режиме реального времени
  • Защита от вредоносных программ, вирусов, троянов, руткитов.
  • Обеспечивает защиту от несанкционированного доступа в корпоративной сети
  • Защищает системные файлы от несанкционированных изменений
  • Сканирует вредоносные программы на файловых, почтовых и веб-серверах, а также на конечных точках
  • Простое развертывание и управление с помощью диспетчера политик или веб-интерфейса пользователя
  • Расширенные функции мониторинга и оповещения для администраторов
  • Поддержка управления брандмауэром внутри и вне сети

Установка

Распакуйте установочный файл:

Отметьте файл как исполняемый:

Установите полную версию:

Или установите только сканер командной строки:

После установки выполните первоначальную настройку:

Источник

F-Secure Elements EPP for Servers

Server Protection is vital

Servers are mission-critical to your communication, collaboration and data storage. F-Secure Elements EPP for Servers provides the utmost security for your servers, while enabling them to run at peak performance.

  • ADVANCED ANTI-MALWARE Award-winning technology (AV-Test) guarantees the highest level of protection.
  • PATCH MANAGEMENT Patches over 2,500 server and third-party software, like Apache, BizTalk, SQL, Flash, etc.
  • CENTRALLY MANAGED FIREWALL Advanced firewall increasing the security of Windows firewall.
  • APPLICATION CONTROL PREMIUM Blocks or restricts unauthorized applications from running.
  • SILENT UPGRADES No need for user interactions or business interruptions.

Protected server platforms

F-Secure Elements Endpoint Protection offers you the utmost security for Windows, Citrix, and Linux servers while keeping them running at peak performance. You can leverage optional components for specialized servers such as Exchange and SharePoint.

  • Windows Server Protection Award-winning protection and patch management for Windows terminal and file servers.
  • Citrix Protection Citrix-Ready certified. Full Citrix support, including patch management for published applications.
  • Linux Protection Provides core security capabilities for Linux clients, in addition to vital integrity checking.

Take no chances with server security

High-profile attacks have proven that servers remain a critical part of the overall security strategy. Because of the vital role they play, servers are one of the most targeted business assets.

In addition to proper configuration, you need proven security that leverages real-time threat intelligence, modern technologies such as heuristic analysis, and tools like patch management to ensure that security levels meet the rigors of the modern security landscape.

True security for your servers

F-Secure Elements Endpoint Protection provides powerful, modern security for your server environment. With real-time threat intelligence via F-Secure Security Cloud, and tools like patch management, your security levels will exceed modern standards.

PATCH MANAGEMENT

Automatically keeps software up-to-date to prevent up to 80% of attacks.

PATCH MANAGEMENT

By automatically keeping all your software up to date with integrated patch management, you can prevent up to 80% of attacks.

Читайте также:  Windows 10 прокрутка возвращается

BEST PROTECTION

AV-TEST recognized F-Secure with its prestigious Best Protection Award for providing the highest level of protection throughout year 2020.

BEST PROTECTION

F-Secure tops industry as the only vendor with an AV-TEST Best Protection award in 7 out of the last 10 years, giving it the most consistent track record in the industry.

BEST ENDPOINT PACKAGE

A powerful and comprehensive business endpoint protection in one package, ensuring best value.

BEST ENDPOINT PACKAGE

By merging your endpoint security into one unified package, we deliver better, broader, and more cost-efficient protection.

SECURITY CLOUD

A cloud-based threat analysis system that builds a real-time picture of the global threat situation.

SECURITY CLOUD

This cloud-based system is constantly in touch with client systems, identifying new threats as they emerge and providing protection within minutes.

Details

Integrated patch management

Software Updater is an integrated patch management feature that comes with F-Secure server clients. Unlike with traditional patch management solutions, there is no need to install separate agents, management servers or consoles.

It works by scanning for missing updates in published applications and within server software. It creates a vulnerability report based on missing patches, enabling administrators to patch the vulnerable software when needed, or automatically—with an option for exclusions.

Software Updater covers over 2,500+ server and third-party software, such as Apache, BizTalk, Microsoft SQL, Flash, Java and many others. It can prevent up to 80% of attacks simply by preventing the exploitation of vulnerabilities, as they are commonly used as attack vectors.

Heuristic & behavior analysis

This new version of DeepGuard combines some of our most advanced security technologies, including artificial intelligence and machine learning. It’s the final and most critical layer of defense against new threats—even those that target previously unknown vulnerabilities.

DeepGuard observes application behavior and proactively intercepts any potentially harmful action on the fly before it causes damage. By switching the focus from signature characteristics to malicious behavior patterns, DeepGuard can identify and block malware even before a sample has been acquired and examined.

When an unknown or suspicious program is first launched, DeepGuard temporarily delays its execution to perform a file reputation and prevalence rate check, runs it in a sandbox environment, then finally executes it for behavioral analysis and exploit interception.

For more information about the functions and benefits of DeepGuard, consult our technical whitepaper.

Protect data against ransomware

F-Secure DataGuard subjects selected high-risk and value-critical folders to advanced monitoring and additional detection logic. It makes them significantly more fortified against ransomware, and prevents malicious and unknown applications from destroying or tampering with the data that they contain. The high-risk and value-critical folders include, for example, the Downloads folder (web downloads), document folders, temp files (email attachments), and data repositories.

The feature’s complementary detection logic significantly increases detection accuracy and aggressiveness against ransomware and their encryption processes. The Data Access module ensures that the data in these folders is not destroyed, tampered with, or encrypted by malicious or unknown applications, such as ransomware. Among other benefits, the Data Access module enables the recovery of data in the event of a successful ransomware attack, as it cannot encrypt the data located in those folders.

Читайте также:  Internet explorer x86 для windows 10

F-Secure DataGuard is available in F-Secure Elements EPP for Servers Premium for Windows servers.

Access for approved hardware only

Device Control prevents threats from entering your system via hardware devices such as USB sticks, CD-ROM drives, and web cameras. This also prevents data leakage, by allowing read-only access, for example.

When a prohibited device is plugged in, Device Control turns it off to prevent user access. You can block access to devices by setting predefined rules, and set rules to allow specific devices while all other devices of the same class are blocked. You can for example:

  • Disallow running programs from USB/CD/other drives: disable auto run, accidental execution or loading modules from removable drives.
  • Block device classes completely.
  • Define read-only access to USB/CD/other drives.
  • Block device classes with exception of specified devices.

Device Control is available in F-Secure Elements EPP for Servers for Windows servers.

Prevent applications from executing

Application Control prevents threats from executing and running scripts, even if they bypass other security layers to get onto your device. This mitigates the risks posed by malicious, illegal, and unauthorized software in the corporate environment.

With Application Control you can:

  • Identify and control which applications are allowed to run in your environment
  • Identify trusted, authorized software automatically
  • Prevent all other applications, whether malicious, untrusted, or simply unwanted from running
  • Eliminate unknown and unwanted applications in your environment to reduce complexity and risk
  • Monitor all applications running within the endpoint environment

Finally, you can use it to block applications from running scripts, for example:

  • Prevent all Microsoft Office applications from running PowerShell scripts
  • Prevent all Microsoft Office applications from running Batch scripts

Application control works based on rules created by our penetration testers that cover attack vectors used to breach into corporate environments. Alternatively, the administrator can define the rules based on various criteria, such as the application name or version.

Application Control is available in F-Secure Elements EPP for Servers Premium for Windows servers.

Real-time threat intelligence

F-Secure Security Cloud is our own cloud-based threat analysis system. It utilizes big data and machine learning, among other input, to continuously add to our knowledge base of digital threats. Security Cloud is constantly in touch with client systems, identifying new threats as they emerge and providing protection within minutes.

A cloud-based threat analysis service affords many benefits over traditional approaches. We gather threat intelligence from a vast number of client nodes, building a real-time picture of the global threat situation. Within minutes, we use that knowledge to protect our customers.

For example, if DeepGuard’s heuristic and behavior analysis identifies a zero-day attack, the information is shared with all protected devices via F-Secure Security Cloud—rendering the advanced attack harmless mere minutes after initial detection.

For more details on the functions and benefits of F-Secure Security Cloud, consult our technical white paper

Источник

Оцените статью