We support browsers, not dinosaurs. Please update your browser if you want to see the content of this webpage correctly.

What are endpoints and why is it crucial to protect them to keep your business secure?

See Endpoint Protection Products

What is endpoint security?

Endpoint security is a broad term that can refer to a number of security measures, but it generally falls under the umbrella of network security. Endpoint security, also known as endpoint protection, is an approach to protecting a business network while it’s being accessed by remote, wireless, or mobile devices such as laptops, tablets, and mobile phones. With close to 100 million cyber breaches for 2018 alone, cybersecurity is too important to ignore.

What are endpoint devices?

Any device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.

What is endpoint security management?

A set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.

What is endpoint security software?

Programs that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.

Endpoint Security in numbers

61% of SMBs are facing cyberattacks this year

400 businesses are targeted every day across the world

62% of global organizations are not prepared for sophisticated cyberattacks

230,000 new forms of malware emerge every day

What can be classified as an endpoint device?

Computers and laptops

Any desktop computer or laptop that is connected to your business network could be used to spread malware. Be sure to consider both in-house computers and those used by employees under a bring-your-own-device (BYOD) policy, as well as any external PCs connecting to the office network via VPN.

Mobile phones

Mobile phones require special attention. It is risky to connect personal devices to the office network before they have been set up with a mobile antivirus that has the latest software updates. Staff using their personal devices should also receive training as part of any BYOD policy.

Office appliances

It’s not just mobile devices and computers that are at risk. Printers, faxes, smart devices, or any other appliances that connect to your network could be potentially vulnerable and will need to be protected.

Servers

Servers are one of the more traditional types of endpoint. It’s especially important to protect them because they store or process your business data, emails, and business documents. This sensitive information needs a specialized layer of security.

Is my endpoint security sufficient?

Take a look at the list below of potential vulnerabilities and ask yourself if you are doing enough to keep your business endpoints secure from threats:

Operating systems

Are all the devices in your business running Windows XP or later and are the servers the 2003 version or newer? Older versions may not have received patches or updates to protect against more recent security defects, meaning your devices will be at greater risk from malware.

Number of devices

Do you have control over all the devices that access your network? You should be able to access and update all their hardware regularly.

Updated programs

Are all of your applications up to date, and can you update programs and software on all the devices connected to your network? Older versions of software can have security holes, vulnerabilities, and bugs that can be exploited by hackers. These are often fixed with patches, which is why you should always update all your business software.

Predefined policies

Do you have predefined universal security policies that include breach processes, minimal passwords, and centrally managed security checks? Manual and ad-hoc controls and rules are not enough to guarantee maximum security for your business.

Keeping up to date

Are you up to date with the latest developments in cybersecurity? You don’t have to be an expert, but cybersecurity is continually evolving, meaning that there are always new developments to learn about, whether it’s gaining a better understanding of cybercrime, or keeping up to speed on improved security measures.

Windows
Windows Server
macOS
Linux
20% OFF
Windows OS workstations
Windows OS servers
macOS workstation
Antivirus Antivirus Pro Antivirus Pro Plus
A$ 218.72 A$ 273.40 A$ 281.20 A$ 351.50 A$ 337.44 A$ 421.80
Buy now Buy now Buy now
  Get full, unabridged protection for Mac devices — at the lowest price possible.
Recommended  Best value. Protects all your devices by reinforcing your network and website security and eliminating all vulnerabilities. Take advantage of Windows-Server exclusive features and get the best value for your money.
Avast Business Antivirus Avast Business Antivirus Pro Avast Business Antivirus Pro Plus
A$ 273.40 A$ 351.50 A$ 421.80
A$ 218.72 Per 5 device(s) and 1 year A$ 281.20 Per 5 device(s) and 1 year A$ 337.44 Per 5 device(s) and 1 year
Buy now Buy now Buy now
Management Console With Management Console you can manage all your devices from one place. To manage each device separately without the console, please choose Standalone Antivirus. Yes Yes Yes
File Shield Actively scans files, URLs, and email attachments to protect your business from malware, spyware, ransomware and more. Scans files and programs before allowing them to open or run. Yes Yes Yes
CyberCapture When an unrecognized file is downloaded onto one of your PCs, a copy will be sent to our experts at the Avast Threat Labs to identify if it's safe or not. Sends suspicious files to the Threat Lab for analysis. Yes Yes Yes
Firewall You lock your business’ doors — so do the same for your network by employing a powerful, customizable Firewall that stops unwanted visitors in their tracks. Filters network traffic and stops untrusted connections. Yes Yes Yes
Behavior Shield Deeply-rooted malware can hide inside your running programs. Behavior Shield monitors them all for any suspicious activity to shut down attacks. Stops dangerous programs and applications on your device. Yes Yes Yes
Web Shield Checks web URLs and certificates to ensure they are safe before a network connection is made. Blocks dangerous websites before they open. Yes Yes Yes
Email Shield Inspects both incoming and outgoing emails to ensure they are completely malware-free. Continuously checks for threats in incoming and outgoing emails. Yes Yes Yes
Anti-spam The best way to mitigate risk is to remove it entirely: keep dangerous phishing emails (and annoying spam) out of your and your employees’ inboxes. Blocks unwanted spam and phishing emails. Yes Yes Yes
Smart Scan Efficiency is key for any business. SmartScan combines antivirus, software update, network security, and performance scans into a single one-click fix. Quickly checks for any performance or security issues. Yes Yes Yes
Sandbox If you have risky files you want to run, use our virtual “safe space”, which can execute any file you want, safely separated from the rest of the PC. A safe environment to test dubious files and programs. Yes Yes Yes
Wi-Fi Inspector There are more ways than ever for cybercriminals to sneak onto a network. Find and fix whatever weaknesses might be putting you at risk with our network scanning tool. Discovers vulnerabilities in your network. Yes Yes Yes
Real Site Fake websites are a primary tool for hackers to trick people into giving away personal information. Avoid these sites entirely and keep your employees safe. Keeps you away from fake sites designed to steal your data. Yes Yes Yes
Rescue Disk With a special external drive, you can run an anti-malware scan before the OS boots up, uncovering deep-rooted malware otherwise out of reach. Creates an external backup antivirus to salvage compromised PCs. Yes Yes Yes
Data Shredder Deleted files are easy to recover. Make sure confidential documents containing financial information or customer and employee data are destroyed forever. Permanently deletes files you don’t want recovered. Yes Yes
Browser Cleanup Unwanted add-ons and unnecessary browser data can slow employees down or compromise their data. Keep things running safely and quickly with routine browser cleaning. Erases junk files slowing down your browser. Yes
Webcam Shield Stop webcam spying for good. Now apps have to ask you for permission to use your webcam, so you always know who’s watching. Alerts you before your webcam is turned on. Yes
Passwords Defend employees’ login details with a secure master password. Comes with a browser add-on for easy and secure auto-filling of online login forums. Protects your passwords and streamlines your online accounts. Yes
SecureLine VPN Make every connection private no matter what network or WiFi your employees use to prevent their identities, or your data, from being seen and stolen online. Makes open, vulnerable networks safe, anywhere in the world. Yes
File Shield Actively scans files, URLs, and email attachments to protect your business from malware, spyware, ransomware and more. Scans files and programs before allowing them to open or run. Yes Yes Yes
Web Shield Checks web URLs and certificates to ensure they are safe before a network connection is made. Blocks dangerous websites before they open. Yes Yes Yes
Email Shield Inspects both incoming and outgoing emails to ensure they are completely malware-free. Continuously checks for threats in incoming and outgoing emails. Yes Yes Yes
File Shield Actively scans files, URLs, and email attachments to protect your business from malware, spyware, ransomware and more. Scans files and programs before allowing them to open or run. Yes Yes Yes
CyberCapture When an unrecognized file is downloaded onto one of your PCs, a copy will be sent to our experts at the Avast Threat Labs to identify if it's safe or not. Sends suspicious files to the Threat Lab for analysis. Yes Yes Yes
Web Shield Checks web URLs and certificates to ensure they are safe before a network connection is made. Blocks dangerous websites before they open. Yes Yes Yes
Email Shield Inspects both incoming and outgoing emails to ensure they are completely malware-free. Continuously checks for threats in incoming and outgoing emails. Yes Yes Yes
Anti-spam The best way to mitigate risk is to remove it entirely: keep dangerous phishing emails (and annoying spam) out of your and your employees’ inboxes. Blocks unwanted spam and phishing emails. Yes Yes Yes
Smart Scan Efficiency is key for any business. SmartScan combines antivirus, software update, network security, and performance scans into a single one-click fix. Quickly checks for any performance or security issues. Yes Yes Yes
Wi-Fi Inspector There are more ways than ever for cybercriminals to sneak onto a network. Find and fix whatever weaknesses might be putting you at risk with our network scanning tool. Discovers vulnerabilities in your network. Yes Yes Yes
Real Site Fake websites are a primary tool for hackers to trick people into giving away personal information. Avoid these sites entirely and keep your employees safe. Keeps you away from fake sites designed to steal your data. Yes Yes Yes
Rescue Disk With a special external drive, you can run an anti-malware scan before the OS boots up, uncovering deep-rooted malware otherwise out of reach. Creates an external backup antivirus to salvage compromised PCs. Yes Yes Yes
Sharepoint Server Protection Checks all the files uploaded onto your shared storage to ensure no malware gets the chance to compromise your data. A secure digital space to store and share corporate documents. Yes Yes
Exchange Server Protection Scans and filters emails with malicious attachments or unsafe links to make sure internal communications don’t become threatened by malware. Scans email attachments and protects your communications from SPAM. Yes Yes
Data Shredder Deleted files are easy to recover. Make sure confidential documents containing financial information or customer and employee data are destroyed forever. Permanently deletes files you don’t want recovered. Yes Yes
A$ 273.40 A$ 351.50 A$ 421.80

30-day money back guarantee

A$ 218.72 Per 5 device(s) and 1 year A$ 281.20 Per 5 device(s) and 1 year A$ 337.44 Per 5 device(s) and 1 year

Our products can be installed on any OS, but some listed features might not be supported.

Buy now Free 30-day trial Buy now Free 30-day trial Buy now Free 30-day trial

Our products can be installed on any OS, but some listed features might not be supported.

If you already use the Avast Business Management Console, please log in and purchase from there.

Frequently Asked Questions

System Requirements

What is the difference between network security and endpoint security?

As the name suggests, endpoint security is all about securing processes, business data, and sensitive information stored or passed through the devices connected to your network. Only after you have secured the endpoints, which are the most vulnerable part of your business, should you work on protecting your network as a whole so that cybercriminals and malware can’t get in.

Is antivirus the same as endpoint security?

Antivirus is an umbrella term. It is a program composed of multiple features that each protect a different part of your endpoint device (email, browser, files etc.) However, not all antivirus products have everything it takes to fully protect your device so further protection may be necessary. That may mean setting up specific server protection, manually updating operating systems, and other additional tasks.

Is endpoint security different for businesses and consumers?

The basis of endpoint security is the same for consumers and businesses. However, the type and structure of protected data is different. Businesses store not only their own data, but also sensitive information about their clients, employees, and the business itself.

  • Windows operating system:
  • Avast Business products are supported by Avast Software s.r.o. on the following editions: Windows 7 (Service Pack 1), Windows 8, Windows 8.1, Windows 10 – Windows 10 Pro, Windows 10 Education, and Windows 10 Enterprise. Avast Business Products are supported on the following servicing branches of Windows 10 – Current Branch (CB), Current Branch for Business (CBB), Long-Term Servicing Branch (LTSB) and will be supported for the lifetime of the app.
  • Mac operating system::
  • MacOS 10.9 (Mavericks or later with at least 500 MB of free disk space.)
  • Servers:
  • Windows Server 2019 (64-bit version)
  • Windows Server 2016 (64-bit version)
  • Windows Server 2012 (64-bit version)
  • Windows Server 2008 R2 (64-bit version with the latest Service Pack, excl. Server Core Edition)
  • Microsoft Exchange Server 2016 (64-bit version)
  • Microsoft Exchange Server 2013 (64-bit version)
  • Microsoft Exchange Server 2010 Service Pack 2 (64-bit version)
  • Hardware:
  • Intel Pentium 4 / AMD Athlon 64 CPU supporting SSE2 instructions, 256 MB+ RAM and 2 GB of hard disk space.