WithSecure™ Policy Manager

Manage and control your business security

Scalable centralized security management for all organizations.

The best business security software consists of layered protection that's easy to manage and control.

Policy Manager, the central management tool for WithSecure™ Business Suite, offers advanced, on-site endpoint security management features for demanding IT environments, combined with automation. You can manage all your security applications in one place, define and distribute security policies, monitor your company's overall security, and control end-user behavior in the company network.

Why WithSecure™ Policy Manager?

Automated updates

Keep all levels of the IT infrastructure safe with automated updates

Central Management

Centrally define and distribute security policies, and monitor your company's overall security

One tool

Manage both physical and virtual environments with one tool

Productivity

Control web access to protect your network and improve productivity

Block content

Block certain content from unknown sites and deny external control of compromised assets

Secure banking transations

Allow end-users to conduct online banking and other business-critical transactions securely

WithSecure Proxy

Reduce network traffic and increase scalability with WithSecure Proxy

Software Updater

Automate patch management with Software Updater

Your benefits

Automation is the key to security and efficiency. Policy Manager offers an easier, smarter way to manage IT security in one place - it is the nerve center of WithSecure Business Suite.

It is a highly scalable, automated central security management tool that provides superior control over demanding IT environments.

1

Advanced Management

Advanced management features even for complex environments

2

Enhanced Security

Easy control of all IT assets and user tasks for enhanced security

3

Automation

Reduced administration due to automation of daily operations

4

Shared Management Tool

Shared management tool for physical, virtual, mixed, and hybrid environment

5

Security Management

Security management from endpoints to gateway

Product features

Management

Security management

Manage security settings and customize security profiles

Management hierarchy

Define admin views and management rights

Server management

Centrally manage server security and gain a detailed view of the security and status

Protection

Advanced protection

Gain advanced protection against selected file types from unknown sites

Browsing protection

Ensure safe and efficient online work

Botnet blocker

Stop external control of compromised assets, block ransomware and advanced persistent threats

Reporting & Control

Central deployment

Push the installation of updates

Active Directory synchronization

Automatically synchronize with Active Directory

Security monitoring

View the overall security status at a glance and create detailed reports

Reporting

Get scheduled reporting per domain

Device control

Prevent malware infections via USB

Web content control

Improve security and productivity by controlling access to websites

Connection control

Boost security for sensitive activities like online banking

Other

WithSecure Proxy

Significantly reduce network traffic

MySQL support

Scale your database support for improved reporting, monitoring and backups

Syslog support

Forward alerts to a third-party Syslog and SIEM servers

Software Updater

Keep Windows® and third-party software patched and up to date

Looking for product support?

Find latest articles, instructions and other important support materials.

Product details

Security Management

Central Security Control

Administrators can distribute security policies from Policy Manager to manage endpoint security for workstations individually or in groups. At the same time, digital signatures ensure update integrity.

  • Manage security settings centrally
  • Create and customize individual security policies
  • Assign individualized policies to any computer or group of computers
  • Undertake multiple concurrent admin sessions
  • Define what settings and features end users are allowed to change
WithSecure Proxy

Control WithSecure Database Updates

WithSecure Proxy offers an easy way to control database and software updates. WithSecure Proxy allows you to:

  • Significantly reduce network traffic
  • Increase scalability by distributing the load from Policy Manager to Proxy servers
  • Control and distribute signature updates and third-party software updates
  • Support one or more Proxy instances as configured in the policy
Software Updater

Automatic Patch Management

Over 80% of cyber-attacks occur as a result of outdated software. Software Updater keeps your software and Windows up to date automatically. Since it's integrated, you can easily avoid attacks based on known vulnerabilities.

  • Scan computers for missing software updates, keeping Microsoft Windows operating systems and programs as well as third-party applications patched against vulnerabilities
  • Centrally define and distribute security policies, and monitor your company's overall security
  • Define exclusions to automatic mode based on software names or bulletin IDs
  • Filter out exclusions from the console interface to avoid clutter
  • Proxy software updates to minimize internet traffic

Learn more 

AD Synchronization

Automatically Syncronize With Active Directory

Policy Manager can now automatically synchronize with Active Directory, discovering changes in the Active Directory structure and finding unmanaged hosts.

  • Automatically keep the domain tree in Policy Manager synchronized with Active Directory
  • Notify administrator when finding any unmanaged hosts
  • Support for multiple Active Directory servers
Web Content Control

Boost Security And Productivity

Web Content Control enables you to restrict unproductive and inappropriate Internet usage and manage what web content users are allowed to access from the company network.

  • Reduce productivity losses, bandwidth consumption, and legal risks associated with inappropriate web content
  • Enforce website restrictions in content categories predefined in Policy Manager
  • Improve security with an extra layer of protection
Connection Control

Safe Online Business Transactions

Connection Control prevents banking Trojans from sending sensitive information to online criminals. It does this by automatically closing network connections to unknown sites and preventing new ones during business-critical actions such as online banking. You can enable Connection Control to sites that support HTTPS.

  • Improve security through controlled and safe access to business-critical assets
  • Protect the web browser, the weakest link in business-critical sessions
  • Only allow connections to sites that are verified as safe by WithSecure when banking online or performing other sensitive actions
  • Prevent financial loss due to theft of online banking credentials
  • Prevent business secrets from being stolen through cloud-based CRM access
Advanced Protection

Block Selected Content From Unknown Sites

Web Traffic Scanning Advanced Protection enables you to block certain content from unknown sites, ensuring that employees can work safely and efficiently online.

  • Block content like Flash, Silverlight, Executables, Java, and ActiveX components on unknown sites
  • Block 100% of Java applets from untrusted sources, as well as Windows malware
  • Whitelist trusted sites
  • With Botnet Blocker, you can prevent network activity relating to known botnets by blocking Domain Name Server (DNS) queries on the host level

Find an authorized reseller

We partner with selected resellers to offer our security solutions.

Request a trial

Request a trial

Fill in the form and one of our dedicated security expert will reach out to help you get started with your trial.

We process the personal data you share with us in accordance with our Corporate Business Privacy Policy.
Contact sales

Want to talk in more detail?

Complete the form, and we'll be in touch as soon as possible.

We process the personal data you share with us in accordance with our Corporate Business Privacy Policy.