Machine Learning anti-malware
Machine learning techniques use well-trained machine models and algorithms to predict and block advanced attacks. Bitdefender’s machine learning models use 40,000 static and dynamic features, and are continuously trained on billions of clean and malicious fi le samples gathered from over 500 million endpoints globally. This dramatically improves the effectiveness of malware detection and minimizes false positives.
Process Inspector operates in zero-trust mode, continuously monitoring all processes running in the operating system. It hunts suspicious activities or anomalous process behavior, such as attempts to disguise the process type, execute code in another process’s space (hijack process memory for privilege escalation), replicate, drop files, hide from process enumeration applications and more. It takes appropriate remediation actions, including process termination and undoing changes the process made. It is highly effective in detecting unknown, advanced malware, including ransomware.
Exploit prevention technology protects the memory and vulnerable applications such as browsers, document readers, media files and runtime (ie. Flash, Java). Advanced mechanisms watch memory access routines to detect and block exploit techniques such as API caller verification, stack pivot, return-oriented-programming (ROP) and others. GravityZone’s technology is equipped to tackle advanced, evasive exploits that targeted attacks rely on to penetrate an infrastructure.
Endpoint control and Hardening
Policy-based endpoint controls include the firewall, device control with USB scanning, and web content control with URL categorization. The combination of “Best Performance” and “Best Protection” is unique to Bitdefender, which scored best in these categories in all six tests performed by the prestigious AV-TEST throughout 2017.
Anti-phishing and Web security
Filtering Web Security filtering enables real-time scanning of incoming web traffic, including SSL, http and https traffic, to prevent the download of malware to the endpoint. Anti-phishing protection automatically blocks phishing and fraudulent web pages.
Full Disk Encryption
GravityZone-managed full disk encryption uses Windows BitLocker and Mac FileVault, taking advantage of the technology built into the operating systems. It is available as an add-on to GravityZone Advanced Business Security.
Unpatched systems leave organizations susceptible to malware incidents, outbreaks, and data breaches. GravityZone Patch Management helps you keep your OS and Applications up to date across the entire Windows install base – workstations, physical servers and virtual servers. It is available as an add-on to GravityZone Advanced Business Security.
Response and containment
GravityZone offers the best clean-up technology on the market. It automatically blocks/contains threats, kills malicious processes and rolls back changes.
The solution is trained based on 1 trillion samples from over 500 million endpoints worldwide. Regardless of how much the malware or ransomware is modified, Bitdefender can accurately detect new ransomware patterns, in both pre-execution and run-time mode.
Largest Security Intelligence Cloud
With over 500 million machines protected, the Bitdefender Global Protective Network performs 11 billion queries per day and uses machine learning and event correlation to detect threats without slowing down users.automate
Automate Threat Remediation and Response
Once a threat is detected, GravityZone Advanced Business Security instantly neutralizes it through actions including process terminations, quarantine, removal and roll-back of malicious changes. It shares threat information in real time with GPN, Bitdefender’s cloud-based threat intelligence service, preventing similar attacks worldwide.
Smart Centralized Scanning
It ensures a high level of protection and performance of machines by offloading part of the anti-malware processes to one or more centralized security servers.
Advanced Business Security covers all types of endpoints: physical, virtual and cloud, any form factor: workstation, server, embedded, mobile, any OS: Windows, Linux, Mac and any virtualization platform: VMware, Citrix, Microsoft Hyper-V, KVM, Oracle. It can protect organizations of any size, scaling from tens to millions of endpoints just by cloning virtual appliances.