Data loss resulting from cyber-attacks is one of the greatest threats facing businesses today. Having endpoint protection in place that works in conjunction with your firewall is critical to any information security program.

I-Evolve's i-Protect takes a new approach to network protection. i-Protect blocks malware and infections by identifying and preventing the handful of techniques and behaviors used in almost every exploit.

Protect against viruses and exploits

Solution Highlights

Quarrantined Viruses


Part of remediating a problem is putting it in quarantine so it can’t keep spreading. When necessary, i-Protect will isolate compromised devices until we can be sure they’re safe.

Kills Viruses

Threat Removal

If i-Protect finds something malicious, it will automatically remediate the threat.

Feature Comparison


i-Protect.png + EDR & MTR Standard + EDR & MTR Standard

Web Security

Download Reputation

Web Control / Category-based URL blocking

Peripheral Control

Application Control

Deep Learning Malware Detection

Anti-Malware File Scanning

Live Protection

Pre-execution Behavior Analysis (HIPS)

Potentially Unwanted Application (PUA) Blocking

Intrusion Prevention System (IPS)

Data Loss Prevention

Runtime Behavior Analysis (HIPS)

Antimalware Scan Interface (AMSI)

Malicious Traf c Detection (MTD)

Exploit Prevention

Active Adversary Mitigations

Ransomware File Protection (CryptoGuard)

Disk and Boot Record Protection (WipeGuard)

Man-in-the-Browser Protection (Safe Browsing)

Synchronized Security (Firewall, Anti-Virus)

Enhanced Application Lockdown

Prevention features available in
all i-Protect versions

Detect And Investigate

i-Protect.png + EDR & MTR Standard + EDR & MTR Standard
Live Discover (Cross estate SQL querying for tdreat hunting and IT security operations hygiene)  
SQL Query Library (pre-written, fully customizable queries)  
Suspicious Events Detection and Prioritization  
Fast Access, On-disk Data Storage (up to 90 days)  
Threat Cases (Root Cause Analysis)
Deep Learning Malware Analysis  
Advanced On-demand Threat Intelligence  
Forensic Data Export  


i-Protect.png + EDR & MTR Standard + EDR & MTR Standard
Automated Malware Removal
Synchronized Security Heartbeat
Remote Terminal Access (remotely investigate & take action)  
On-demand Endpoint Isolation  
Single-click "Clean and Block"  

Managed Service

i-Protect.png + EDR & MTR Standard + EDR & MTR Standard
24/7 Lead-driven Threat Hunting  
Security Health Checks  
Data Retention  
Activity Reporting  
Adversarial Detections  
Threat Neutralization & Remediation  
24/7 Lead-less Threat Hunting    
Threat Response Team Lead    
Direct Call-in Support    
Proactive Security Posture Improvement    
Integration with i-Comply Firewall    

i-Protect Benefits

  • No expensive hardware costs or capital investment.
  • Industry leading threat protection and intrusion prevention.
  • Simplified security management.
  • Improved disaster recovery.
  • 24x7 monitoring with MTR option.
  • Increased productivity.
  • Scalable to meet your organization’s needs.

Download the data sheet

Request Information

Cloud Solutions


Cloud Servers

Cloud VoIP

Web Services

Email and Spam Protection

Data Backup & Recovery

Managed Firewall

Network Monitoring

Cloud Antivirus