Skip to content

Introducing Coro Endpoint Security

Coro's Endpoint Security module is your first line of defense against endpoint threats such as malware and ransomware.

By installing Coro's Agent application on your organization's endpoint devices, Endpoint Security can monitor and protect against common threats and suspicious activity. Through the Agent, Coro can often automatically remediate security incidents without admin intervention.

Endpoint Security architecture

Coro uses a unique threat intelligence model to identify malicious activity and anomalous behavior inconsistent with normal usage. Endpoints also benefit from enhanced backup and recovery defense, where device snapshots are hardened against tampering and deletion (a common activity of ransomware).

Coro can additionally help protect devices through enforcement of a strong security posture - by ensuring devices are up to date and properly configured with the correct defenses in place.

Read the articles in this chapter to learn about how Coro Endpoint Security can protect your devices through:

Coro extends device security through the Endpoint Detection and Response module, providing deep monitoring and analysis of malicious activity in device files and processes. To learn more, see Coro Endpoint Detection and Response (EDR).

Coro also offers Mobile Device Management, a module to manage iOS/iPadOS and Android mobile devices for end users across your organization. To learn more, see Mobile Device Management with Coro.

Accessing Coro Endpoint Security

To access the Endpoint Security module:

  1. Sign in to the Coro console.

  2. From the Actionboard, select Control Panel from the top of the Endpoint Security dashboard panel:

    Endpoint Security from Actionboard
  3. Alternatively, from the sidebar, select Control Panel > Endpoint Security:

    Endpoint Security