SecureAPlus

AI Powered Endpoint Protection

Get Enterprise Trial

SecureAPlus


AI Powered Endpoint Protection



Get Enterprise Trial

The Three Pillars of Essential Security Features


SecureAPlus is the unique amalgamation of essential security features that protect enterprise endpoints against multiple attack vectors - known or unknown, file or file-less, internal or external.

With multiple layers of defense through its powerful yet simple Application Whitelisting, more than 10 anti-virus engines in the cloud with Universal AV, and AI-powered APEX engine rest assured that it is the only security solution ever need.


Highlights


  • Application Whitelisting & Control
  • AI-Powered APEX Engine
  • 10+ Cloud Antivirus Engines
  • Anti-Ransomware & Fileless Attack Protection
  • Optional Offline Antivirus

The Three Pillars of Essential Security Features


SecureAPlus is the unique amalgamation of essential security features that protect enterprise endpoints against multiple attack vectors - known or unknown, file or file-less, internal or external.

With multiple layers of defense through its powerful yet simple Application Whitelisting, more than 10 anti-virus engines in the cloud with Universal AV, and AI-powered APEX engine rest assured that it is the only security solution ever need.


Highlights


  • Application Whitelisting & Control
  • AI-Powered APEX Engine
  • 10+ Cloud Antivirus Engines
  • Anti-Ransomware & Fileless Attack Protection
  • Optional Offline Antivirus
Image


The First Pillar


Application Control & Whitelisting


When close to a million pieces of malware are created each day, chances are that an anti-virus is not going to keep up. The latest and most advanced forms of malware are undetectable with zero-day threats always a step ahead of any anti-virus available in the market.

Application Whitelisting puts you ahead of the curve. It strictly prevents unauthorized applications from running amok your endpoints – keeping untrusted and potentially malware-ridden software from distracting users from the things that matter to your business the most. 

Image


The First Pillar


Application Control & Whitelisting


When close to a million pieces of malware are created each day, chances are that an anti-virus is not going to keep up. The latest and most advanced forms of malware are undetectable with zero-day threats always a step ahead of any anti-virus available in the market.

Application Whitelisting puts you ahead of the curve. It strictly prevents unauthorized applications from running amok your endpoints – keeping untrusted and potentially malware-ridden software from distracting users from the things that matter to your business the most. 

Image


The Second Pillar


AI-Powered
APEX Engine


SecureAge APEX Engine harnesses the power of artificial intelligence (AI) with deep learning to take on the threats of today and tomorrow.

Leveraging on the power of big data, the APEX engine goes beyond traditional scanners by effectively and reliably spotting malicious patterns to efficiently allow for quick decisions based on prior experience. It can adaptively update its knowledge against newer and unseen malware variants that may attempt to infect endpoints during an outbreak.

Image


The Second Pillar


AI-Powered APEX Engine


SecureAge APEX Engine harnesses the power of artificial intelligence (AI) with deep learning to take on the threats of today and tomorrow.

Leveraging on the power of big data, the APEX engine goes beyond traditional scanners by effectively and reliably spotting malicious patterns to efficiently allow for quick decisions based on prior experience. It can adaptively update its knowledge against newer and unseen malware variants that may attempt to infect endpoints during an outbreak.

Image


The Third Pillar


Universal
Anti-Virus


The 2 key flaws of anti-viruses are that not a single one can detect close to every threat and that they are not created equals.

Available for commercial use, our patented Universal AV provides increased coverage and detection against known threats by using more than 10 anti-virus engines at a time while leveraging cloud technology for minimum performance impact.


Image

The Third Pillar


Universal Anti-Virus


The 2 key flaws of anti-viruses are that not a single one can detect close to every threat and that they are not created equals.

Available for commercial use, our patented Universal AV provides increased coverage and detection against known threats by using more than 10 anti-virus engines at a time while leveraging cloud technology for minimum performance impact.


Security Management for Any Business Size


Security Management for Any Business Size


Up to 50 Endpoints




SecureAPlus Portal For Small & Medium Business (SMB)


The SecureAPlus Portal lets business owners to conveniently and securely manage Windows PC endpoints with SecureAPlus Premium from readily available endpoint security status checks to email notifications of potential threats.

Businesses can take security further by remotely managing the approval of installation of new and unknown applications preventing unnecessary applications from being installed while adding the flexibility of maintaining a central whitelist.

With the Policy Control Add-On, administrators can easily create, edit, and implement unique security configurations of SecureAPlus for deployment on certain groups of devices.

Up to 50 Endpoints




SecureAPlus Portal For Small & Medium Business (SMB)


The SecureAPlus Portal lets business owners to conveniently and securely manage Windows PC endpoints with SecureAPlus Premium from readily available endpoint security status checks to email notifications of potential threats.

Businesses can take security further by remotely managing the approval of installation of new and unknown applications preventing unnecessary applications from being installed while adding the flexibility of maintaining a central whitelist.

With the Policy Control Add-On, administrators can easily create, edit, and implement unique security configurations of SecureAPlus for deployment on certain groups of devices.

50 Endpoints and Beyond




Security Management Server (SMS) For Large Enterprise


With large enterprise endpoints amounting to hundreds and thousands, the Security Management Server takes advantage of commercial grade hardware and processes to implement advanced security controls that not only keep endpoints safe but also the data contained within those endpoints.

The Security Management Server allows IT administrators to easily monitor, update, and push approved whitelists across large numbers of endpoints to ensure minimal downtime and maximum productivity.

It takes advantage of either commercial grade hardware or a virtual machine in the cloud to implement advanced security controls that help administrators facilitate application control and whitelisting as well as other data security functions*.


*Works with SecureAge Suite solutions for integration of other data security features such as encryption.

50 Endpoints and Beyond




Security Management Server For Large Enterprise


With large enterprise endpoints amounting to hundreds and thousands, the Security Management Server takes advantage of commercial grade hardware and processes to implement advanced security controls that not only keep endpoints safe but also the data contained within those endpoints.

The Security Management Server allows IT administrators to easily monitor, update, and push approved whitelists across large numbers of endpoints to ensure minimal downtime and maximum productivity.

It takes advantage of either commercial grade hardware or a virtual machine in the cloud to implement advanced security controls that help administrators facilitate application control and whitelisting as well as other data security functions*.


*Works with SecureAge Suite solutions for integration of other data security features such as encryption.

Mass Deployment & Activation

Easily install SecureAPlus en masses to enterprise endpoints by pushing an approved whitelist to newly deployed devices.

Web Console User Interface

Administrator access via a dedicated web portal to manage SecureAPlus security on any machine connected to the network.

Whitelist Management

Ensures standardized client system configurations by managing and enforcing a whitelist to allow only trusted and authorized applications to run on endpoints.


Request Whitelist Approval System

IT Administrators can remotely respond to requests by non-privileged users in Lockdown mode to add an unauthorized application to the whitelist.

Software Update Push Controls

Push installation of SecureAPlus software updates to particular groups or endpoint devices.

 

Mass Deployment & Activation

Easily install SecureAPlus en masses to enterprise endpoints by pushing an approved whitelist to newly deployed devices.

Web Console User Interface

Administrator access via a dedicated web portal to manage SecureAPlus security on any machine connected to the network.

Whitelist Management

Ensures standardized client system configurations by managing and enforcing a whitelist to allow only trusted and authorized applications to run on endpoints.

Request Whitelist Approval System

IT Administrators can remotely respond to requests by non-privileged users in Lockdown mode to add an unauthorized application to the whitelist.

Software Update Push Controls

Push installation of SecureAPlus software updates to particular groups or endpoint devices.


Awards Recognition


Awards Recognition


Image

Aug 2020

Awarded VB100 Certification

Image

Jul 2020

Ranks BEST+++ in
Advanced In The Wild Malware Test

Image

May 2020

Ranks Best+++ in for Micro-Business & Individuals

Image

Nov 2019

Ranks Best in Solution for Small Companies

Image

Oct 2019

Ranks Best in Free Security Product

Image

Sep 2019

Ranks BEST+++ in
Advanced In The Wild Malware Test

Image

Jun 2018

Ranks Best in AV Lab Anti-Ransomware/
Cryptominer/
Bashware Test

Image

Oct 2017

Ranks Best in AV Lab Fileless Malware Protection Test

Image

Apr 2017

Ranks Best in AV Lab Drive-by Download Test

Image

Oct 2016

Ranks Best in AV Lab Ransomware Protection Test

Image

Aug 2020

Awarded VB100 Certification


Image

Jul 2020

Ranks BEST+++ in Advanced In The Wild Malware Test


Image

May 2020

Ranks Best+++ in for Micro-Business & Individuals


Image

Nov 2019

Ranks Best in Solution for Small Companies


Image

Oct 2019

Ranks Best in Free Security Product


Image

Sep 2019

Ranks BEST+++ in Advanced In The Wild Malware Test


Image

Jun 2018

Ranks Best in AV Lab Anti-Ransomware/Cryptominer/
Bashware Test


Image

Oct 2017

Ranks Best in AV Lab 2017 Fileless Malware Protection Test


Image

Apr 2017

Ranks Best in AV Lab 2017 Drive-by Download Test


Image

Oct 2016

Ranks Best in AV Lab 2016 Ransomware Protection Test


Technical Specifications


Technical Specifications


Hardware Requirements

  • 2 GHz Pentium 4 or higher processor
  • 1GB of RAM or as recommended by the Windows OS whichever is higher
  • 300 MB hard disk free space or more
  • Local hard disk that is formatted with NTFS file system.
  • Minimum screen resolution: 1024×768 (At 100% Scale)

Supported Operating Systems:

  • Windows 10 (32-bit and 64-bit)
  • Windows 8.1 (32-bit and 64-bit)
  • Windows 8 (32-bit and 64-bit)
  • Windows 7 Home Basic and above (32-bit and 64-bit) with Service Pack 1
  • Windows Server 2019 (64-bit)
  • Windows Server 2016 (64-bit)
  • Windows Server 2012 R2 (64-bit)
  • Windows Server 2012 (64-bit)
  • Windows Server 2008 R2 and above (64-bit)

Hardware Requirements

  • 2 GHz Pentium 4 or higher processor
  • 1GB of RAM or as recommended by the Windows OS whichever is higherM
  • 300 MB hard disk free space or more
  • Local hard disk that is formatted with NTFS file system.
  • Minimum screen resolution: 1024×768 (At 100% Scale)

Supported Operating Systems:

  • Windows 10 (32-bit and 64-bit)
  • Windows 8.1 (32-bit and 64-bit)
  • Windows 8 (32-bit and 64-bit)
  • Windows 7 Home Basic and above (32-bit and 64-bit) with Service Pack 1
  • Windows Server 2019 (64-bit)
  • Windows Server 2016 (64-bit)
  • Windows Server 2012 R2 (64-bit)
  • Windows Server 2012 (64-bit)
  • Windows Server 2008 R2 and above (64-bit)

Related Resources

Image

SecureAPlus 2019 Ransomware Report

Download >