| | GravityZone Elite | Recommended to companies looking for aggressive protection against sophisticated threats | | Learn More | | | GravityZone Advanced Business Security | Recommended to midsized companies looking for comprehensive protection | | Learn More | | | GravityZone Business Security | Ideal for small businesses looking for simple, yet efficient security | | Learn More | |
| | On premise / Cloud | | On premise / Cloud | | On premise / Cloud |
TYPES OF ENDPOINTS PROTECTED |  | Consistent, next-gen defenses across any type of endpoints | | | | | | | |
 | Security for physical and virtual endpoints | State of the art security for end-user device | | |  | |  | |  |
 | Server Security with Smart Centralzed Scanning - on-premises or in the cloud (also available by CPU socket licensing) | Pro-VM, Pro-Cloud defenses with Smart Centralized Scanning for high performance and optimum user experience. | | |  | |  | | |
 | Security for Mobile Devices | Device and platform agnostic mobile security. | | |  On-Premises Console Only | |  On-Premises Console Only | | |
 | Security for Exchange | Unrivalled defense against spam and phishing attempts. | | |  | |  | | |
 | Security for IoT | Agentless defenses that can detect threats for IIoT, IoMTs and other types of IoTs. | | | Available with the NTSA product | | Available with the NTSA product | | Available with the NTSA product |
TECHNOLOGIES |  | | | | | | | |
 | Endpoint Risk Analytics | Assesses, prioritizes and hardens endpoint security misconfigurations and settings with an easy-to-understand prioritized list. | | | Cloud Console Only | |  | |  |
 | Web Threat Protection | Scans incoming web traffic, including SSL, http and https traffic, to prevent the download of malware to the endpoint. Automatically blocks phishing and fraudulent web pages. Displays search ratings signaling trusted and untrusted pages. | | |  | |  | |  |
 | Device Control | Threats are often introduced into the company via removable devices. Choose which devices to allow to run and decide what will be blocked or scanned automatically. | | |  | |  | |  |
 | Application Control (Blacklisting) | Enables full visibility and control of running applications by blacklisting unwanted software. Helps limit the risk of malicious code running undetected. | | |  | |  | |  |
 | Application Control (Whitelisting) | Provides full visibility and control of applications installed or running on company endpoints, and prevents the execution of any application not allowed by policy. | | |  On-Premises Console Only | | | | |
 | Firewall | Endpoints are protected with fully featured two-way firewall with Intrusion Detection, critical for protecting remote devices. | | |  | |  | |  |
 | Automatic Sandbox Analyzer | Sends suspicious files for detonation, analyzes and provides a verdict in real time. Detects zero-day & targeted attacks; Real time attack prevention with auto-submit; Analyzes once, enterprise-wide block. | | |  | | | | |
 | HyperDetect™ (Tunable Machine Learning) | Tunable machine learning layer, detects sophisticated threats. Blocks hacking tools, fileless attacks, zero-day malware and more. | | |  | | | | |
 | Smart Centralized Scanning | Allows up to 30% more virtual machines than traditional solutions by optimizing and centralizing scan tasks. | | |  | |  | | |
 | Local and Cloud Machine Learning | Predictive detection of unknown malware; Dynamic file analysis trained on billions of samples; Local machine learning trained on 80,000 malware features.Threat intelligence from over 500 million endpoints globally. | | |  | |  | |  |
 | Exploit Defense | Focuses on attack tools and techniques to detect both known and zero-day exploits that target popular software applications. | | |  | |  | |  |
 | Process Inspector | Behavior-based real time detection; Monitors all processes running in the operating system and if the process is deemed malicious, will terminate it.Formerly known as Advanced Threat Control (ATC). | | |  | |  | |  |
 | Automatic Disinfection and Removal | Automatically blocks confirmed threats through a set of predefined rules, including process termination, moving to quarantine or access blocking. | | |  | |  | |  |
 | Fileless Attacks Defense | Protects against attacks that attempt to write changes directly in memory. | | |  | |  | | |
 | Network Attack Defense | Protects against threats that use network vulnerabilities. | | |  | |  | |  |
EXTEND SECURITY WITH COMPATIBLE PRODUCTS | | | | | | | | |
AVAILABLE ADD ONS |  | | | | | | | |
 | Email Security | For all email clients, including Office 365. | | | Cloud Console Only | | available | | available |
 | Patch Management | Keeps OSes and Applications up to date across the entire Windows install base. | | | available | | available | | available |
 | Full Disk Encryption | Protects data for the entire endpoint hard drive by leveraging the encryption mechanisms provided by Windows (BitLocker) and Mac (FileVault). | | | available | | available | | available |
 | Security for AWS | Built for virtualization, offers flexible pricing, and scales to your size and needs for optimal return on investment. | | | available | | available | | available |
COMPATIBLE PRODUCTS |  | | | | | | | |
 | Hypervisor Introspection | Protects business sensitive data before they are exposed by detecting and stopping in real-time the cyber attacks at the hypervisor level. | | | On-Premises Console Only | | On-Premises Console Only | | |
 | Security for Storage | Complete security solutions for data storage protection for enterprise ICAP-compatible file-sharing and network storage systems. | | | available | | available | | |
 | Network Traffic Security Analytics | Cloud threat intelligence, Machine Learning and behavior analytics applied to network traffic to detect advanced attacks early and enable effective threat hunting. | | | available | | available | | available |
AVAILABLE SERVICES |  | | | | | | | |
 | Professional Services | Empower your organization with optimal security configuration, protection and tailored services. | | | available | | available | | available |
 | Premium Support | Choose the Silver, Gold or Platinum Premium Enterprise Support packages, depending on the response times and the types of proactive services necessary for your organization. | | | available | | available | | available |
 | Advanced Threat Intelligence | Collects data from sensors across the globe - correlate hundreds of thousands of Indicators of Compromise and turn data into actionable, real-time insights. | | | available | | available | | available |
| | Covers desktops, servers and Exchange mailboxes. No more than 35% of licenses can be used on servers. | | Covers desktops, servers and Exchange mailboxes. No more than 35% of licenses can be used on servers. | | Covers servers and desktops. Servers should account for less than 30% of total units |
| | | | | | |
| | | | | | |
| | | | | | |