Advanced threat detection and response
Deep threat detection: Yulevo Sentry EDR sets detection anchor points for all attack positions in the whole attack path of hackers; it sets specific continuous detection points for the attack paths in combination with attack techniques, tactics and scenarios.
Professional attack traceability: With regards to all detected threats, the product provides detailed attack principles, attack methods, attack information and repair suggestions; it clearly marks the tactics and attack stages used by attackers, providing path-level event traceability.
Flexible and secure handling: The product supports automatic response combination configuration of multiple response elements, attack types, risk levels and other triggering conditions, making users' defense strategies more effective.
Ransomware protection
The Yulevo Sentry EDR end-side anti-ransomware scheme directly hits the pain point of ransomware attack, helping users build a systematic ransomware attack resistance ability of “normal, before, during and after events”.
The scheme successfully passed the V2.0 certification of the new-generation ransomware protection capability test system of SKD Labs, and Ni Guangnan, an academician of the Chinese Academy of Engineering, awarded Yulevo the first batch of “Starcheck” ransomware protection capability certificates, which indicated that the ransomware protection capability of Yulevo Sentry EDR end-side scheme reached the international level.
Endpoint phishing
Yulevo Sentry EDR provides comprehensive terminal phishing protection for enterprises, which can detect the running process, network and file behaviors, quickly find and block malicious credential theft, malicious phishing, malicious document execution and other behaviors.
Mining protection
The behavior of virtual currency “mining” will lead to a significant decline in the computing performance of the device. Attackers can control the zombie host infected with mining virus to carry out horizontal diffusion attacks in intranet, and even deliver ransomware into it to demand ransom.
Yulevo Sentry EDR can accurately identify and intercept the invasion of mining viruses and Trojans, intercept the mining program at the process level, block the callback of its mining pool,and ensure the endpoint security.
Virus detection and killing
Yulevo Sentry EDR integrates multiple virus detection and killing engines to realize one-time scanning and multi-dimensional detection, providing users with detailed detection and judgment information and professional handling suggestions, and improving the efficiency of secure operation.
The targeted optimization is conducted to mining Trojans, worm viruses, hacker tools, etc. by combining Yulevo's self-developed detection and killing engine, significantly improving detection accuracy.
Security control
According to the requirements of enterprise endpoint security management and regulatory compliance, Yulevo Sentry EDR has launched a security control module to meet the strict control demands of enterprises for external devices, software and files.
Asset ledger & risk situation
Yulevo Sentry EDR can help users automatically collect terminal information, form normalized asset ledger and change logs, help users establish a data-driven terminal risk management system, and provide effective data support for attack surface convergence, vulnerability fixing, system reinforcement and other security-related work.
When a security incident occurs, the asset ledger can quickly provide detailed information of the endpoint device, and help the security team quickly locate the source of the problem, and formulate emergency measures, effectively improving the security emergency response capability.