Previous
Coro Logo

Coro Essentials Suite

How It Works

Device Posture Apply device posture policies to users or groups and determine the remediation action for vulnerabilities. Next-gen Antivirus Advanced threat protection (ATP) analyzes both static files and running processes for anomalies and suspicious behavior. Allow/Block Lists Create lists of files, folders, and processes to allow or block, protecting your endpoints from known threats and vulnerabilities. Malware Scanning Identify and quarantine emails with potential malware or ransomware attachments. Email Phishing Protection Prevent threats from domain impersonation, spoofing, and other misleading phishing attempts. Allow/Block Lists Create and maintain a list of individual senders or sending domains to allow or block from your business inboxes. Endpoint Detection & Response Reboot or shut down devices remotely, isolate infected devices from the network, or block specific processes.

Categories

#Software
#Other Security & Compliance

Socials

Support

[email protected]

Website

Similar To Coro

Software Security Assessment

Cobalt is a PTaaS platform that transforms traditional pentesting into a data-driven vulnerability management engine.