Our Solutions

Advanced Endpoint Protection


It is mathematically impossible to stop 100% of cyber threats from entering your network. Only ParJenn’s Advanced Endpoint Protection can provide trusted verdicts on 100% of unknown files, with an uninterrupted user experience. Layer Endpoint Detection and Response for increased endpoint visibility to prevent endpoint damage.


What is Advanced Endpoint Protection?

Advanced endpoint protection includes security technologies that can identify new or multi-faceted threats that traditional security software does not normally detect. Organizations today need advanced protection against an increasingly sophisticated threat environment.

The cyber-threat landscape has evolved and so has endpoint protection. Different solutions use different approaches and before you make a decision for your organization, you need to understand the options—and the trade-offs.


Frustrate the Hackers, Not Your Users

When a 2017 Wiki-leaks data dump exposed the CIA’s assessments of 20 security products, we got to see the unvarnished results of the intelligence community’s attempts to foil the same technologies that businesses rely on every day to protect themselves. While many of the biggest names in the market proved to be easily to moderately hackable, there was one solution that seemed to frustrate their best attempts.

Here’s what the CIA—one of the best-funded, most expert hacking organizations in the world—had to say about ParJenn:

“A colossal pain in the posterior. It literally catches everything until you tell it not to.”

That’s good news for you. And there’s more good news. By deploying ParJenn AEP, you’re only thwarting bad actors; your hardworking employees won’t notice the difference.

Source: Cutherbertson, Anthony. “How CIA Hackers Rate Your Computer’s Antivirus.” Newsweek. March 19, 2017

Automatic threat containment: Prevents local and network malware outbreaks by detecting and automatically containing unknown files in an isolated environment separate from the underlying operating system and user data.

Our Managed IT services will help you succeed. Let’s get started


Comprehensive Cyber-Security Protection Includes

  • router-1807_67aa302b-3a94-46a7-aa3d-66b8928a87d7

    Lightweight client

    At as little as 10 MB, the ParJenn client provides the most robust protection on the market without sacrificing usability or scale.

  • telephone-operator-4682_c9489618-836b-47ec-8489-e15f613cb10c

    Host intrusion prevention

    Rules-based IPS that monitors the activities of applications and system processes, blocking malicious behaviors by halting
    actions that could damage critical system components.

  • computer-network-1878_39828809-88f9-48e1-9a76-61c99401ec99

    File lookup service

    Provides a cloud-based file rating system to quickly determine the status of a file if it appears on the file list, the trusted software vendors list, or ParJenn’s own safe-list. These trusted files are excluded from further monitoring, reducing system resource consumption.

  • settings-server-1872_2e41baf2-8789-4215-b430-db35c3899936

    Website filtering

    Set up specific rules—which can be user-specific and time-dependent— to block access to specific websites.

  • source-code-1754_2b435bd8-ce76-4910-8137-7d07a3557fa3

    Personal packet filtering firewall

    Can be administered locally or remotely and provides granular management of inbound and outbound network activity, hides system ports from scans, and provides warnings when suspicious activities are detected.

  • add-image-5030_dcf585b8-8f3d-48ad-8579-a4ad56d14ba6


    A solid defense-in-depth security strategy requires enterprises to deploy a diverse security toolkit using technologies from a range of vendors. In a heterogeneous- by-design environment, interoperability is crucial. ParJenn AEP containment technology has no known incompatibilities with productivity or security software.


Our services provide a unique range of benefits

  • 100% Verdict

    100% of the time.

    Every file receives a verdict—good or bad— every time.

  • Human analysis

    In the 5% of cases where VirusScope and Valkyrie are unable to return a verdict, the file can be sent to researchers for human analysis who make a determination within SLA timelines.

  • Behavioral analysis

    ParJenn uses behavioral analysis on files running in containment. ParJenn VirusScope uses techniques such as API hooking, DLL injection prevention, and
    more to identify indicators of compromise while keeping the endpoint safe and without affecting usability.

  • Anti-virus scanning

    ParJenn’s sophisticated antivirus engine actively scans endpoints against a massive list of known good and bad files compiled from years as the world’s largest certificate authority and from the 85 million endpoints deployed worldwide. This quickly catches and eliminates easily detected known malicious software.

  • Verdict decision engine

    While running in auto-containment, unknown files are uploaded to ParJenn Valkyrie in the cloud for real-time analysis. This global threat cloud, which analyzes 73 billion file queries and 300 million unique unknown files annually, returns a verdict within 45 seconds for 95% of the files submitted.

Because the global threat cloud is crowd-sourced, the knowledge gained about one unknown file benefits all ParJenn AEP users.

You benefit from the network effect of 85 million users.


Stop wasting time and money on technology. Let’s get started

"A colossal pain in the posterior. It literally catches everything until you tell it not to."
Cutherbertson, Anthony. “How CIA Hackers Rate Your Computer’s Antivirus.” Newsweek. March 19, 2017.