Features:Provides prevention techniques that shield operating systems, applications, and services by defining acceptable behaviors for each function. Protects systems from mis-use by unauthorized users and applications through system and device controls that lock down configuration settings, file systems, and the use of removable media
Feature:Provides monitoring, notification, and auditing features that ensure host integrity, system and regulatory compliance |