Data loss resulting from cyber-attacks is one of the greatest threats facing businesses today.  Having endpoint protection in place that works in conjunction with your firewall is critical to any information security program.

I-Evolve's i-Protect takes a new approach to network protection.  i-Protect blocks malware and infections by identifying and preventing the handful of techniques and behaviors used in almost every exploit.

Protect against viruses and exploits

Solution Highlights

Quarrantined Viruses


Part of remediating a problem is putting it in quarantine so it can’t keep spreading. When necessary, i-Protect will isolate compromised devices until we can be sure they’re safe.

Kills Viruses

Threat Removal

If i-Protect finds something malicious, it will automatically remediate the threat.

Product Features

Attack Surface Reduction

​Web security

The Web protection feature is part of I-Protect Anti-Virus and is included with all I-Protect Central licenses that include this product. This feature is designed to prevent threats from reaching the web browser.

​Download Reputation

Download Reputation is a feature of the Windows Endpoint product that checks files downloaded from some internet browsers against a database of malicious files and websites. The database uses feedback from I-Protect’ latest Windows Endpoint products to generate reputation scores for files seen on customer endpoints. The reputation scores are currently based on the prevalence, age and URL source of files.

​Web Control / Category based URL blocking

This provides protection, control, and reporting for endpoint machines that are located, or roam, outside your corporate network. I-Protect Web Control allows for the filtering of 14 essential site categories on user machines.

​Peripheral Control (USB)

I-Protect Device Control now allows an administrator to manage the use of storage devices, network interfaces and media devices connected to all managed endpoints.

​Application Control

Application Control enables network administrators to block certain legitimate applications from running on work computers. Typically, you would use Application Control to prevent users from running applications that are not a security threat, but that you decide are unsuitable for use in your workplace environment. For example, games or instant messaging programs.

​Client Firewall

Proactively lock down your computers to protect against known and unknown threats, such as internet worms and hackers.

Before It Runs On Device

​Anti-Malware File Scanning

As malware continues to rapidly evolve and grow, i-Protect has realized that it needs a way to enhance existing data updates with a system to keep endpoint protection up to date in real-time. This was done to both improve the response time to new malware and reduce the amount of data delivered to the endpoints.

​Live Protection

Live Protection is a technology that allows live SXL lookups to obtain the latest threat information from the i-Protect cloud without waiting for the product to be updated. It also provides a means to automatically upload samples of files that deem interesting and worth investigating further.

​Pre-execution Behavior Analysis (HIPS)

Pre-execution Behavior Analysis happens Pre-execution, the behavior of code is analyzed before it runs and is prevented from running if it is considered to be suspicious or malicious.

NOTE: HIPS = Host Intrusion Prevention System

​Potentially Unwanted Application (PUA) Blocking

Potentially unwanted applications are programs that aren't malicious, such as dialers, remote administration and hacking tools, but are generally considered unsuitable for most business networks.

Stop Running Threat

​Runtime Behavior Analysis (HIPS)

Runtime Behavior Analysis identifies the suspicious behavior of processes that are running and present on the computer at the time. This analysis protects you against attacks from malware, spyware, hacking tools and Potentially Unwanted Applications as well as some exploits and intruder attacks.

NOTE: HIPS = Host Intrusion Prevention System

Investigate And Remove

Automated Malware Removal

Malware is the general term we use to describe any computer threats including Trojans, worms, and computer viruses. I-Protect allows you to quickly and easily clean up majority of the malware detected.

i-Protect Benefits

  • No expensive hardware costs or capital investment.
  • Industry leading threat protection and intrusion prevention.
  • Simplified security management.
  • Improved disaster recovery.
  • 24x7 monitoring.
  • Increased productivity.
  • Scalable to meet your organization’s needs.

Download the data sheet

Request Information

Cloud Solutions


Cloud Desktops

Cloud Servers

Cloud VoIP

Web Services

Email and Spam Protection

Data Backup & Recovery

Managed Firewall

Network Monitoring

Cloud Antivirus