Avid delivers powerful, behavior based endpoint security for small and medium businesses.

By David Hollingsworth, Managing Member at Avid Communications

Avid Communications: End Point Security SolutionsAvid’s endpoint security is a far more comprehensive and effective solution than the antivirus solutions small and medium businesses currently deploy. This solution provides protection for remote employees or employees that travel. Why does this matter? Home networks have become a popular attack vector.

Avid is pricing this service similar to standalone antivirus solutions, affording businesses the opportunity to  finally have a comprehensive and sophisticated endpoint security solution.

Most businesses will deploy antivirus software that will attempt to block known malware (viruses, worms, ransomware, trojans, hybrid, etc.) Antivirus software is a part of endpoint security, but is far from a complete solution. Given enough time and resources, hackers will find a way to avoid detection.  Once malware is deployed, the average time it takes for the malware to be detected (referred to as “dwell time”) is roughly 7 months.

Avid’s endpoint security doesn’t solely rely only on antivirus protection.


Identify and Assess Vulnerabilities

Assess the Risk in Real TimeAvid’s endpoint security starts by proactively reducing threats by continuously assessing vulnerability risks. This includes rating the security risk of applications, identifying vulnerabilities, identifying rogue devices and taking proactive risk mitigating actions.

Prevent Attacks with Next Generation Antivirus Engine (NGAV)

Avid uses a machine learning antivirus engine to block malware before they are able to execute. The kernel-based NGAV is continuously updated to identify new malware. The antivirus agent is the tool most businesses solely rely on to protect desktops and servers.

Detect and Defuse Attacks in Real-Time

Real Time Threat AnalysisThe biggest advantage, and, the most important feature of Avid’s solution, is what happens when an endpoint has been compromised.

Assume a new ransomware variant made it to a computer undetected. Avid’s service will detect and stop the attack in real-time, even when the endpoint has been compromised. This real-time, post-infection blocking protects data from ransomware encryption. Without this response, there is nothing stopping the ransomware from executing.

Avid’s endpoint security protects data by stopping malware (including file-less malware) and other advanced attacks in real-time. As soon as suspicious process flows and behaviors are detected, Avid’s endpoint protection immediately stops the potential threats by blocking outbound communications and access to the file system from those processes. These actions prevent data from being taken (data exfiltration), command and control (C&C) communications, file tampering, and ransomware encryption.

Respond and Repair

Based on the attack, Avid’s security operations center (SOC) will utilize a wide variety of remediation tactics. These tactics include automated termination of malicious processes, removal of files, isolation of applications, and roll back of malicious changes.

Avid has been providing communications and security services to businesses for over fifteen years. Our endpoint protection is our most significant advancement in endpoint security, allowing us to affordably provide this to small and medium businesses. Endpoint security is a critical piece of a well designed, layered security approach. Avid can help design a layered security approach to meet each of our customer’s requirements.

Want to know more? Please give us a call!

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *