Call us
+44 (0)20 8830 6820

SonicWall Capture Client Premier 250 - 499 Endpoints

Complete endpoint protection, management and Premier features. Price per endpoint including Capture Advanced Threat Protection Sandboxing, Content Filtering, Certificate Deplyment, Device Control, Next-Generation Antimalware, Endpoint Visibility & Enforcement, Cloud Management, Threat Hunting with Deep Visibility, Remote Shell, 24x7 Support.
SKU: 02-SSC-9827
£64.28
£48.79
*

Modern Endpoint Protection for a Rapidly Evolving Threat Landscape

The ever-growing threat of ransomware and other malicious malware-based attacks has proven that client protection solutions cannot be measured based only on endpoint compliance. Traditional antivirus technology uses a long-embattled signature-based approach, which has failed to match the pace of emerging malware and evasion techniques.

With the proliferation of telecommuting, mobility and BYOD, there is a dire need to deliver consistent protection, application vulnerability intelligence, and web policy enforcement and more for endpoints anywhere. SonicWall Capture Client is a unified endpoint offering with multiple EPP and EDR capabilities.

Key Benefits
  • Get high efficacy, actionable threat detection without the noise
  • Centralized and cloud-delivered management with true multi-tenant capabilities to fortify network and endpoint security
  • Reduced total cost of ownership
  • Empower and up-level security and IT teams with an easy-to-use, intuitive solution that stops modern adversaries
SonicWall Capture Client
Capture Client applies behavior-based advanced threat protection, powered by NGAV SentinelOne. Including Capture ATP Integration for higher security effectiveness, faster response times and a lower total cost of ownership
Continuous behavioral monitoring
  1. See complete profiles of file, application, process, and network activity
  2. Protect against both file-based and fileless malware
  3. Deliver a 360-degree attack view with actionable intelligence
Threat Hunting with Deep Visibility
  1. Utilize Deep Visibility to search for threats based on behavior indicators as well as Indicators of Compromise (IOC) across covered Windows, MacOS, and Linux devices
  2. Automate Threat Hunting and Response with Custom Rules and Alerts
Capture Advanced Threat Protection (ATP) integration
  1. Automatically upload suspicious files on Windows devices for advanced sandboxing analysis
  2. Find dormant threats before execution such as malware with built-in timing delays
  3. Reference Capture ATP’s database of file verdicts without the need to upload files to the cloud
Unique rollback capabilities
  1. Support policies that remove threats completely
  2. Autonomously restore endpoints to a known good state, before malicious activity initiated
No need for regular scans or periodic updates
  1. Enable the highest level of protection at all times without hampering user productivity
  2. Receive a full scan on install and continuously monitors for suspicious activity continually afterward
Multiple layered, heuristic-based techniques
  1. Leverage cloud intelligence, advanced static analysis and dynamic behavioral protection
  2. Protect against and remediate known and unknown malware before, during, or after an attack
Application Vulnerability Intelligence
  1. Catalog every installed application and any associated risk
  2. Examine known vulnerabilities with details of the CVEs and severity levels reported
  3. Use this data to prioritize patching and reduce the attack surface
Endpoint Network Control
  1. Add firewall-like controls to the endpoint
  2. Use an additional quarantine rulebase to handle infected devices
Optional integration with SonicWall firewalls
  1. Enable enforcement of deep packet inspection of encrypted traffic (DPI-SSL) on endpoints
  2. Easily deploy trusted certificates to each endpoint
  3. Direct unprotected users to a Capture Client download page before accessing the Internet when behind a firewall
Content Filtering
  1. Block malicious sites IP addresses, and domains
  2. Increase user productivity by throttling bandwidth or restricting access to objectionable or unproductive web content
Device Control
  1. Block potentially infected devices from connecting to endpoints
  2. Use granular allow listing policies
Remote Shell (Premier only)
  1. Eliminate the need to have physical contact with devices for troubleshooting, changing local configurations, as well as conducting forensic investigations
Isn’t my traditional signature-based antivirus good enough?

No. SonicWall discovers millions of new forms of malware annually. Capture Client stops malware not already identified in signatures.

What if I don’t want to replace my firewall vendor?

A firewall is not necessary for the protection of endpoint clients using the Capture Client products.

What if I don’t have budget for a new solution?

Malware infections are costly. 61% of businesses have been infected by ransomware, but less than 50% of those business that paid ransom got all data restored.

What if I don’t want to take up large chunks of memory for another large application file on our end points?

Capture Client file size is negligible (between 50-250 MB) and uses roughly 0.1% of system resources.

Download the SonicWall Capture Client datasheet:

SonicWall Capture Client Data Sheet

SonicWall Capture Client
SonicWall Capture Client Video Data Sheet
Utilize Global Management and Visibility
How to Quarantine and Remediate Threats on an Endpoint Using Capture Client
How Capture Client Protects Linux Endpoints
Edition Comparison

Feature

Advanced

Premier

Cloud Management, Reporting & Analytics (CSC)

  

Network Security Integrations

Endpoint Visibility

  

DPI-SSL Certificate Deployment

  

Content Filtering

 

 

Advanced Endpoint Protection

Next-Generation Antimalware

  

Capture Advanced Threat Protection Sandboxing

  

ActiveEDR (Endpoint Detection and Response)

Attack Visualization

 

 

Rollback & Remediation

 

 

Device Control

 

 

Application Vulnerability and Intelligence

 

 

Rogues

 

Endpoint Network Control

 

ActiveEDR Threat Hunting and Intelligence

Threat Hunting with Deep Visibility

 

Remote Shell

 

Exclusions Catalogue

 
*
*
*
back to top