
With legacy antivirus, viruses are detected and removed after they infect the device. Malware and viruses don't reach the device. This means that advanced security software can detect and block attacks even as they are happening.

This software uses machine learning and AI to teach itself what potential threats might be. Software is installed on each endpoint as well as on centrally-managed servers. These include desktops, laptops, servers, and mobile devices. How Does Advanced Endpoint Security Work?ĭevices on the company's network are referred to as endpoints.


This software continually listens, monitors, scans, and prevents threats before they happen. Unlike legacy antivirus software that is mostly reactive, today's sophisticated security tools are proactive.
