i-Guard: Artificial Intelligence for EndPoint Defense & Response

i-Guard is designed for companies wishing to protect efficiently endpoints of their networks:

  •  Cyber protection for all Endpoints: Servers, PCs, laptops, Tablet PCs, Windows Phones
  •  Multi-network: protect one or more remote networks, regardless of size
  •  Easy deployment: our Network module installs i-Guard on your client computers with only a few clicks
  • - Easy to manage: see and act on each endpoints’ security event
  • - DLP: Manage data flows to and from external USB storage media
  • - Multilingual: the management console is installed directly in the local language

i-Guard radically identifies and blocks all unlisted threats that cannot be detected by conventional antivirus solutions as well as ransomwares like Cryptolocker or WannaCry, Advanced Persistent Threats (APT's), targeted attacks and Zero-days attacks... all threats that exploit softwares’ vulnerabilities installation or updates are blocked.

i-Guard is fully compatible with your old antivirus and can be installed as an add-on or a substitute. i-Guard is an Endpoint Detection and Response (EDR) software. Its strength is to combine several defense techniques with artificial intelligence.

Its technology, different and unique, offers MORE than it could bring combined various security software (antivirus, antimalware ...).

I-Guard is compatible with your old antivirus and can be installed as an add-on or as a substitute. I-Guard is a clever and innovative EDR (Endpoint Detection and Response ) security software. Its strength is to combine several defense techniques with artificial intelligence.

Its technology, different and unique, offers MORE than you could obtain, combined various security software (antivirus software, antimalware ...).

Editor: i-Guard

Strengths of i-Guard

i-Guard demo and screenshots

i-Guard customers

No customer reference

i-Guard pricing and features

Plans & Pricing

Standard
Standard
Contact us
Contact us

Features

Backup
Antivirus
Automatic file exclusion Exclusion of files based on their size, sharing settings, etc.
IT Protection
Anti-Phishing
Blocking of Installed Software
Diagnosis of Software and Server Access
Firewall
Mail Server Protection
Peripheral Device Control
Protection Against Viruses, Spyware, Trojans, Ransomware (Cryptolocker)
Security Diagnosis Audit in order to detect security breaches
Security Report

Data hosted in the following countries: France