Detect and block exploits automatically
RevBits Endpoint Security automatically detects, classifies, blocks and reports exploit attempts of vulnerabilities, including Zero-days. The RevBits Phoenix module (part of RevBits Endpoint Security) detects and classifies all common exploit techniques, including but not limited to heap overflow, buffer overflow, memory corruption, use-after-free, RoP gadgets, heap spraying and more.
Detailed historical information of all executed commands
RevBits Endpoint Security records and reports all executed commands and scripts in all command and script interpreters including Windows Command Prompt, Powershell, VBScript and JScript.
USB device management
RevBits Endpoint Security USB Device Policies can be used to whitelist or blacklist all USB devices. Whitelisting and blacklisting can be applied by Vendor ID, Product ID, or device type (e.g. webcams, wireless adapters, storage, etc.).
Advanced, patented anti-rootkit technology
Attacks using rootkits to exploit trusted drivers are on the rise. RevBits Endpoint Security provides full visibility to the kernel and blocks all unauthorized signed or unsigned drivers from accessing the kernel.