Sorry, you need to enable JavaScript to visit this website.

Endpoint Protection and Vulnerability Assessment

99.7% of web applications contain at least one vulnerability 1, while 77% of servers are vulnerable due to poor patching or weak configuration.2 To reap the benefits of the cloud, it is essential for businesses to secure their workloads across all physical, virtual and cloud servers. Singtel Endpoint Protection and Vulnerability Assessment offers a comprehensive suite of intelligent security tools to protect your servers and endpoints, close security gaps, mitigate risk and accelerate compliance for your hybrid cloud. 

1 Trustwave application scanning and testing services

2 2016 Edgescan Vulnerability Statistics Report


Application control 

By locking down your system, untrusted files and applications are prevented from making unauthorised changes.

Bi-directional firewall 

The bi-directional firewall inspects all incoming and outgoing traffic, reducing the attack surface and stopping lateral movement of threats.


Integrity monitoring 

The file system and registry is monitored and tracked, providing audit trails and triggering alerts on unexpected changes. 

Intrusion prevention

Intrusion prevention technology uses virtual patching to shield against operating system and application vulnerabilities, reducing the need for emergency patching and frequent patch cycles.

Log inspection 

Report indicators of compromise (IOCs) from system event log, and identify important security events to ensure compliance. 

Malware protection

Scan, isolate and remove malware infections and fend off sophisticated attacks using machine learning and sandbox analysis.

Vulnerability scan 

Your network and applications are automatically inspected for vulnerabilities, allowing you to identify security weaknesses before hackers can exploit them.

Web reputation

Detect and shut down command and control (C&C) call-backs, so as to prevent communications with known botnets.

Reduce operational impact

Your systems are protected from zero-day threats even when no patch is available. This reduces the need for emergency patching, frequent patch cycles and costly downtime. 

Accelerate compliance

Accelerate compliance with automated vulnerability scanning. This enforces consistent security policies across the hybrid cloud. 

Simplify security management

Free up valuable manpower by automating repetitive security tasks. This allows centralised visibility and simplify management through a user-friendly portal.
Business Scenarios

Network security

  • Intrusion prevention technology uses virtual patching to shield your systems against vulnerabilities, even before a patch is released (Microsoft CVEs).
  • Vulnerability scans can be scheduled or launched on demand to assess your server’s security posture, allowing you to prioritise the most critical security issues. 
  • Bi-directional firewall reduces attack surface and stops lateral movement of malware.

System security

  • Operating systems and applications are monitored and analysed for suspicious behaviour and malicious activity.
  • All untrusted files and applications are prevented from executing on the lock-down server automatically.
  • Real-time alerts are immediately triggered on unexpected system changes.

Malware prevention

  • Detect, isolate and remove malware on your servers, through the use of advanced detection techniques like machine learning and sandbox analysis.

Cost-effective compliance

  • Address major compliance requirements for PCI-DSS, as well as HIPAA, NIST and SSAE 16 with reports detailing prevented vulnerabilities, detected attacks, and policy compliance status.