On the Radar: Trusted Knight Protects Endpoints and Websites - Product Image

On the Radar: Trusted Knight Protects Endpoints and Websites

  • ID: 4382924
  • Company Profile
  • 6 pages
  • Ovum
1 of 3
Introduction:

Protector stops the action of malware rather than its installation, so it can be used to complement traditional antivirus, keeping endpoints safe until malware is removed.

Highlights:

Cloud-DMZ protects websites and web applications from exploits such as cross-site scripting (XSS), SQL injection, and remote file inclusion (RFI), as well as distributed denial-of-service (DDoS) attacks.

Features and benefits:
  • Explains Trusted Knight's approach to endpoint security and how it differs from antivirus.
  • Explains how Cloud-DMZ works to protect websites.
Key Questions answered:
  • Why is there a need for technology such as Trusted Knight's in endpoint protection?
  • Which of its two product lines has greater potential for Trusted Knight?
Note: Product cover images may vary from those shown
2 of 3
1. Summary
  • Catalyst
  • Key messages
  • Publisher's view
2. Recommendations for enterprises
  • Why put Trusted Knight on your radar?
3. Highlights
  • Background
  • Current position
4. Data sheet
  • Key facts
Note: Product cover images may vary from those shown
3 of 3

Loading
LOADING...

4 of 3
Note: Product cover images may vary from those shown
Adroll
adroll