Endpoint Protection Platform.
TEHTRIS EPP detects and protects operating systems from known threats through advanced antivirus scanning and protection features.
Endpoint Protection Platform,
the future of antivirus.
TEHTRIS EPP is a standalone security agent for workstations and servers, designed to protect companies from today’s threats. The threat knowledge base built into its antivirus engine is automatically and regularly updated to optimize the security of your systems against a wide range of viruses worldwide.
Next-generation antivirus engine and more
Advanced features complement local antivirus protection by fighting vulnerability exploits. TEHTRIS EPP fights targeted intrusions that remotely exploit vulnerabilities in web browsers, office software applications such as PDF readers, etc. TEHTRIS EPP can be installed on all types of recent Windows devices.
Why choose TEHTRIS EPP?
TEHTRIS EPP detects malware with its regularly updated signatures thanks to its signature-based antiviral detection engine.
TEHTRIS EPP detects advanced and unknown attacks in real time, with suspicious markers such as process migration or memory executions.
TEHTRIS EPP analyzes local network connections with anti-phishing and email or http traffic verification if needed.
TEHTRIS EPP can protect software against exploitation of unpatched or unknown vulnerabilities (buffer overflow, Rop…).
TEHTRIS EPP provides a set of predefined rules that protect against common attack scenarios, with the ability to add your own custom rules.
EDR + EPP
TEHTRIS EPP and TEHTRIS EDR can be combined to reduce incident response time through the unified console of the TEHTRIS XDR Platform.
Perfectly integrated into the
When it comes to cybersecurity, orchestrating events and reacting to threats effectively and quickly is a fundamental challenge. One of the best ways to do this is with powerful automation and artificial intelligence. This is what TEHTRIS offers with its SOAR integrated with the TEHTRIS XDR Platform.
Increased efficiency with TEHTRIS UES
TEHTRIS UES is the console that unifies and strengthens the effectiveness of EDR, EPP and MTD solutions. Equipped with powerful and easy-to-use front-end tools, the UES console will provide you with enhanced cybersecurity action capabilities, from temporary crisis operations to regular monitoring.
|macOS High Sierra||Compatible|
|Windows 8||Untested but designed for compatibility||Compatible|
|Windows Server 2003||Compatible||Untested but designed for compatibility|
|Windows Server 2008||Compatible||Compatible|
|Windows Server 2008 R2||Compatible||Compatible|
|Windows Server 2012||N/A||Compatible|
|Windows Server 2012 R2||N/A||Compatible|
|Windows Server 2016||N/A||Compatible|
|Windows Server 2019||N/A||Compatible|
|Windows XP||Compatible||Untested but designed for compatibility|
|CentOS Linux 5.11||Compatible|
|CentOS Linux 5.3||Compatible|
|CentOS Linux 6.9||Compatible|
|CentOS Linux 7.5||Compatible|
|Ubuntu Linux 14.04 Trusty||Compatible|
|Ubuntu Linux 16.04 Xenial||Compatible|
|Ubuntu Linux 18.04 Bionic||Compatible|
|Ubuntu Linux 8.04 Hardy||Compatible|
MITRE ATT&CK compliance
MITRE ATT&CK is a knowledge base with a model of the behavior of a cyber attacker, reflecting the different phases of the attack life cycle according to the targeted platforms: Windows, Mac, Linux, mobile, etc.
day to deploy TEHTRIS EPP
for an update of the threat bases
of threats available from the EPP console with TEHTRIS CTI
Preserve the sovereignty and integrity of your data
Since 2010, TEHTRIS innovates and improves its cyber defense solution, through the different modules of the TEHTRIS XDR Platform.
Choose the European leader in cyber security!
* © 2020 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.
*** The GARTNER PEER INSIGHTS Logo is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved.
« Gartner Peer Insights reviews constitute the subjective opinions of individual end users based on their own experiences and do not represent the views of Gartner or its affiliates »