Summary of features

Version 2.0 of SES Evolution offers the following features.

SES Evolution 2.0 features

Protection  
Memory overflow Protects your pool from intrusion attempts and vulnerability exploitation.
Process hollowing
Security token theft
File system bypass
Keylogging
File access control Controls all system resources and access to them. Allows applications to make changes, access these resources or blocks them. You can also simply monitor them.
Registry base access control
Memory access control
Execution control
Driver loading detection Detects rootkits that attempt to load or change drivers in the kernel.
Driver alteration detection
Application firewall Controls incoming and outgoing network communications for each application.
Wi-Fi access point control Manages allowed Wi-Fi networks and prevents the Wi-Fi-LAN bridge from being set up.
Floppy disk or CD/DVD drive control, serial ports Controls devices allowed in your pool through fully customizable rules.
Bluetooth device control
USB device control
USB decontamination air gap Controls the USB keys and hard disks in your pool, manages trusted devices and blocks devices that have not been validated.

 

Configuration  
Management via agent groups Organizes your pool according to your requirements through a simple but powerful system of agent groups.
Configuration deployment Deploys new configurations in all agents with a single click in the administration console.
Stormshield security policy

Protects your pool with a default policy that covers common threats and adds custom security rules to fully adapt the policy to your environment.

Context-based security policies Adapts security to agents’ environment so that they apply different policies based on their location.
Policy management through rule sets Pool security rules in your policies and manage exceptions easily.
Scheduled tasks Runs commands on agents by configuring scripts from the administration console.
Agent modularity Manages features installed on each agent from the administration console: uninstall unused features, delete incompatible versions and reduce the attack surface.
Challenges Allows some operations to be performed securely through a question/response system.
Simultaneously connected administrators Organizes your administrators by role to manage simultaneous access to various resources on the administration console.

 

Activity monitoring  
Dashboard See the status of your pool in a glimpse with a simple dashboard.
Log tracking Views events that agents raise, filtering them by priority, type, group, etc.
Attack analysis Follows incidents and analyzes attacks in a dedicated panel that illustrates steps in charts and provides additional information to better understand each attack.
Agent monitoring Tracks the pool’s agents in real time, checks their status and assigns them to groups
Syslog server export

Exports all events in your SIEM system to include them in your other sources of security information (firewall, antivirus, etc.).