Skip to main content

Welcome to GravityZone

GravityZone is a multilayered security solution that provides enhanced attack protection by leveraging an extensive set of system-hardening, threat-prevention, and detection technologies, as well as machine learning and behavioral analysis.

Explore the onboarding guide and take your first steps in using GravityZone.

Optimize remote work protection, enhance resistance to sophisticated ransomware attacks and data breaches, and reduce risk with a comprehensive solution designed with your security in mind.

Antimalware

Bitdefender employs advanced cybersecurity measures such as content scanning and heuristic analysis to safeguard against a wide range of malicious software.

This technique involves comparing scanned artifacts with an up-to-date security database. However, a vulnerability period may exist between the emergence of new threats and the release of fixes.

Bitdefender's detection technologies identify potential malware by analyzing behavioral patterns and executing suspicious files in a secure virtual environment to evaluate their effects on the system.

For more information regarding this feature, refer to Antimalware.

Advanced Threat Control

To safeguard against cybersecurity threats that evade the heuristic engine, an additional level of security is implemented through Advanced Threat Control.

This technology constantly observes active processes and evaluates suspicious actions such as disguising the process type, performing code execution in the memory space of another process (for privilege escalation), replicating or depositing files, and evading detection from process enumeration applications.

For more information regarding this feature, refer to Advanced Threat Control.

HyperDetect

HyperDetect is a cybersecurity technology that provides an extra layer of protection against sophisticated cyberattacks during the pre-execution phase. It utilizes advanced machine learning models and stealth attack detection technology to defend against threats such as zero-day attacks, advanced persistent threats (APT), obfuscated malware, fileless attacks, credential theft, targeted attacks, custom malware, script-based attacks, exploits, hacking tools, suspicious network traffic, potentially unwanted applications (PUAs), and ransomware.

For more information regarding this feature, refer to HyperDetect.

Advanced Anti-Exploit

Advanced Anti-Exploit, powered by machine learning, is a proactive technology that prevents zero-day attacks executed through evasive exploits. It detects and blocks the newest cyberattacks in real time while addressing memory corruption vulnerabilities that may bypass other security measures. It protects commonly used applications, including browsers, Microsoft Office, Adobe Reader, and others. It monitors system processes and defends against threats such as unauthorized access and process hijacking.

For more information regarding this feature, refer to Advanced Anti-Exploit.

Firewall

The Firewall controls the network and Internet access of applications. It provides automatic access to a comprehensive database of verified applications and safeguards the system from port scanning, limits Internet Connection Sharing (ICS) functionality, and notifies users when new nodes are added to a Wi-Fi network.

For more information regarding this feature, refer to Firewall.

Blocklist

The Blocklist feature allows you to manage and control access to files and network connections identified as potential threats during incident investigations. By adding harmful files to the blocklist, you ensure they are prohibited from running on the network, thereby reducing the risk of harm or the spread of malicious software.

For more information regarding this feature, refer to Blocklist.

Network Attack Defense

The Network Attack Defense feature is powered by Bitdefender technology that identifies network attacks attempting to infiltrate endpoints through methods like brute-force attacks, network exploits, password stealers, drive-by-downloads, bots, and Trojans.

For more information regarding this feature, refer to Network Attack Defense.Network Attack Defense

Patch Management

The Patch Management feature, seamlessly incorporated within GravityZone, ensures that operating systems and software applications remain up to date. It also provides an overview of patch status across your managed Windows and Linux endpoints.

Features include on-demand and scheduled patch scanning, automatic and manual patching, and missing patch reporting.

For more information regarding this feature, refer to Patch Management.

Integrity Monitoring

Integrity Monitoring involves a comprehensive evaluation and authentication of modifications executed on Windows and Linux endpoints, with the aim of determining the soundness of various entities.

The operational mechanism of Integrity Monitoring is based on both pre-defined rules, which are provided by Bitdefender, and bespoke rules.

Integrity Monitoring is designed to respond to events that are triggered for various system components such as files, folders, registry entries, users, services, and installed software, in accordance with the established guidelines.

For more information regarding this feature, refer to Integrity Monitoring.

Content Control

Content Control helps enforce company policies regarding network traffic, web access, data protection, and application control.

Administrators can define scan options and exclusions, schedule web access, allow or block specific categories or URLs, configure data protection rules, and control access to applications.

For more information regarding this feature, refer to Content Control.Content Control

Device Control

Device Control effectively mitigates the risk of sensitive data leakage and malware infections that may result from external devices connected to endpoints. This is achieved through the application of blocking rules and exceptions via policy.

Supported devices include USB flash drives, Bluetooth devices, CD/DVD drives, and storage devices.

For more information regarding this feature, refer to Device Control.

Full Disk Encryption

This technology enables comprehensive disk encryption on endpoints using BitLocker for Windows and FileVault or diskutil for macOS.

GravityZone facilitates easy encryption and decryption of boot and non-boot volumes while securely storing recovery keys in case of forgotten passwords.

For more information regarding this feature, refer to Full Disk Encryption.

Security for Exchange

Security for Exchange offers a comprehensive suite of security features, including antimalware, antispam, antiphishing, and content filtering, fully integrated with Microsoft Exchange Server.

These technologies provide advanced protection while ensuring secure communication and preventing unauthorized access to user data.

For more information regarding this feature, refer to Security for Exchange.

Sandbox Analyzer

Sandbox Analyzer protects against sophisticated threats by automatically analyzing suspicious files that lack known antimalware signatures.

Sandbox Analyzer executes files in a secure environment to identify malicious behavior, triggered by heuristics integrated with the Antimalware On-access module in the Bitdefender security agent installed on endpoints.

For more information regarding this feature, refer to Sandbox Analyzer.

Endpoint Detection and Response

Endpoint Detection and Response is a real-time monitoring solution that detects and responds to cyber threats targeting endpoints such as laptops, servers, and mobile devices.

Endpoint Detection and Response provides a highly effective event correlation component that is designed to detect advanced threats or ongoing attacks.

For more information regarding this feature, refer to Endpoint Detection and Response (EDR).

eXtended Detection and Response

eXtended Detection and Response, a sophisticated cross-company event correlation component, detects advanced attacks across multiple endpoints in hybrid infrastructures, including workstations, servers, and containers, running on various operating systems.

This solution assists incident response teams in investigating and addressing sophisticated threats by providing a comprehensive incident view across the organization.

For more information regarding this feature, refer to eXtended Detection and Response (XDR).

Security for Storage

Security for Storage provides real-time protection for network-attached storage and file-sharing systems, using antimalware services delivered through ICAP-compliant servers.

GravityZone Security Server instances can operate as ICAP servers, delivering antimalware services to Network-Attached Storage (NAS) devices and file-sharing systems. Multiple servers can be utilized in this role.

For more information regarding this feature, refer to Security for Storage.

GravityZone Security for Containers

The GravityZone Security for Containers is a specialized Docker container that operates on an underlying Ubuntu 20.04 base image and leverages the official Debian package of BEST Linux.

The application operates as a container with elevated privileges on either a Kubernetes node or a container host.

This solution augments the security layers of the host operating system by offering server workload Endpoint Detection and Response, Advanced Anti-Exploit, and Antimalware scanning services to both the host operating system and the running containers.

For more information regarding this feature, refer to Container protection (deployed through a Security Container) and Container protection (deployed through BEST).

Email Security

Email Security protects against various types of threats, such as impersonation attacks, Business Email Compromise (BEC), CEO fraud, phishing, ransomware, and many others.

This feature includes a powerful policy engine, connection rules, email authentication, user synchronization, antispam, antimalware, quarantine management, safe and deny lists, executive tracking lists, disclaimer functionality, detailed reports and charts, scheduled reports, SecureMail for added protection, and AD connect for seamless integration and synchronization with Active Directory groups.

Additionally, it offers comprehensive insight into the flow of mail, including any rules that have been triggered and the corresponding actions that have been executed.

For more information regarding this feature, refer to Email Security.

Mobile Security

Mobile Security is a mobile security solution able to protect mobile devices using Android, Chrome OS, or iOS operating systems against multiple threat vectors.

It is designed to protect an employee’s corporate-owned or BYOD ("bring your own device") from advanced persistent threats without sacrificing privacy or personal data.

For more information regarding this feature, refer to Security for Mobile.

Endpoint Risk Analytics

Endpoint Risk Analytics identifies, assesses, and remediates Windows endpoints weaknesses via security risk scans, taking into account a vast number of indicators of risk.

The Risk Management dashboard, accessible in the GravityZone Control Center, provides an overview of your network risk status and offers guidance based on industry best practices.

For more information regarding this feature, refer to Endpoint Risk Analytics (ERA).

Compliance Manager

The Compliance Manager provides you with an overview of the general compliance status of your organization’s endpoints relative to recognized standards.

It offers access to a a list of individual control names, the sections they belong to, and the score assigned to each control. Additionally, it includes a feature for generating compliance reports with one click.

For more information regarding this feature, refer to Compliance manager.

Proactive Hardening and Attack Surface Reduction (PHASR)

The Proactive Hardening and Attack Surface Reduction (PHASR) solution identifies internal attack surfaces and provides recommendations after a learning phase that analyzes typical user and system behavior.

This technology classifies attack vectors into the following categories: Living Off the Land Binaries (LolBins), Crypto miners, Piracy tools, Tampering tools, and Remote admin tools.

For more information regarding this feature, refer to PHASR.

External Attack Surface Management (EASM)

EASM solutions help organizations gain a comprehensive view of their external attack surface,

Bitdefender EASM helps companies reduce risk by identifying internet-facing assets and services, enhancing existing GravityZone capabilities.

For more information regarding this feature, refer to External Attack Surface Management (EASM).