Harmony Endpoint Security

Advanced endpoint protection to help prevent, detect, and remediate malware attacks

More than 70% of breaches originate at the endpoint, not surprising given the wide attack surface created by thousands of end-user devices that connect to an organisation’s network. An endpoint can be compromised via malicious email attachments, USB drives, websites and downloads, and then used to access corporate data.

Harmony Endpoint Security helps detect signs of malware by scanning email attachments and websites, with the ability to block external USB drives and scan rogue Internet traffic.

It has been built in partnership with Check Point, a leading provider of cyber security solutions.

Harmony Agent

Harmony Agent is suitable for compatible laptops, desktops, servers & IoT devices.

Harmony Mobile

Harmony Mobile is for compatible IOS & Android handset and tablets.

Key features

Fit for a range of purposes

A single solution for endpoints desktop, laptop, VDI, servers and IoT devices. Compatible with most operating systems.

Zero Phishing

The ability to scan username and password fields on a website before a user enters their credentials in order to help verify if the site is legitimate.

Threat Emulation and Threat Extraction

Scans email attachments and downloaded documents before the user accesses the file and then provides a safe copy of the attachment, often in under two minutes.

Managed locally

Cloud management hosted in Australia for data sovereignty purposes.

Reduce the attack surface

Prevention-first, self-protection capabilities that are perfectly suited to the mobile workforce.

Benefits

\

Easy to deploy and manage

Zero-touch deployment, easy to manage and friendly to end-users.

Cost effective and scalable

Pay for what you need based on per user per month cost structure. Scale up or scale down as your business requires.

Prevention-first strategy

Helps prevent malware from entering via the Internet or USB drives. Importantly, it can help stop malicious files from getting to the user’s machine.

Protection against stolen credentials

Zero phishing functionality helps prevent the stealing of credentials.

Why Telstra

Comprehensive security solutions

From denial-of-service protection, managed firewall, and internet protection, we have a range of solutions to help keep your organisation secure.

Keep your security tools up-to-date

We invest in security innovation to bring you new platforms for rapid, automated security alerts and management.

Simplifying security management

We make securing your business easy with a bundled range of products, licenses and service features in a range of flexible commercial offerings, so you get the security you want at the right price.