Guide to VIPRE Cloud Migration
This migration guide provides detailed information on migrating from your existing endpoint protection anti-malware solution to VIPRE Cloud. We specifically cover migrating from VIPRE Endpoint Security Server to one of our VIPRE Cloud products, but you will find information regarding migrating from other products as well.
Which VIPRE Cloud product meets my needs?
The table below compares the features of all versions of VIPRE's Endpoint Security product line.
Feature | Endpoint Security Server | Endpoint Security Cloud (ESC) | Endpoint Detection & Response (EDR) |
---|---|---|---|
Early Blocking |
|||
DNS Protection | n/a | n/a | n/a |
Enhanced DNS Protection | ✔ | ✔ | ✔ |
Web Access Control | n/a | ✔ | ✔ |
Malicious URL Blocking | ✔ | ✔ | ✔ |
Malicious Content Blocking | ✔ | ✔ | ✔ |
Removable Device Control (e.g. USB) | ✔ | n/a |
n/a |
Removable Device Encryption | ✔ | n/a |
n/a |
Client Firewall | ✔ | ✔ | ✔ |
Patch Management | ✔ | n/a | n/a |
Vulnerability and Patch Management | n/a | ✔ | ✔ |
Signature-based Detection | ✔ | ✔ | ✔ |
Deep Scanning |
|||
Email Anti-Spam | ✔ | ✔ | ✔ |
Email Anti-Phishing | ✔ | ✔ | ✔ |
Email Anti-Malware | ✔ | ✔ | ✔ |
File/Attachment Scanning | ✔ | ✔ | ✔ |
On-Access Active Protection | ✔ | ✔ | ✔ |
Pre-execution Behavior Analysis/HIPS | ✔ | ✔ | ✔ |
Malicious Traffic Detection (IDS) | ✔ | ✔ | ✔ |
Browser Exploit Prevention (via PM/AAP) | ✔ | ✔ | ✔ |
Application Exploit Prevention (via PM/AAP) | ✔ | ✔ | ✔ |
Unprotected Device Discovery | ✔ | n/a | n/a |
Active Threat Hunting |
|||
Runtime Behavior Analysis/HIPS | ✔ | ✔ | ✔ |
Advanced Active Protection (ML Behavior Analysis) | ✔ | ✔ | ✔ |
Ransomware and Zero-day Detection | ✔ | ✔ | ✔ |
Low CPU and Memory Usage | ✔ | ✔ | ✔ |
Containment |
|||
Process Blocking | ✔ | ✔ | ✔ |
Quarantine | ✔ | ✔ | ✔ |
Device Isolation | n/a | n/a | ✔ |
Investigate and Remove |
|||
Automated Malware Removal/Quarantine | ✔ | ✔ | ✔ |
False Positive Exclusion | ✔ | ✔ | ✔ |
Custom Malware Analysis | ✔ | ✔ | ✔ |
Custom Malware Removal | ✔ | ✔ | ✔ |
Forensic File Sandbox | n/a | n/a | ✔ |
Forensic URL Sandbox | n/a | n/a | ✔ |
Incident Management | n/a | n/a | ✔ |
Event Analysis | n/a | n/a | ✔ |
MITRE ATT&CK Mappings | n/a | n/a | ✔ |
Root Cause Analysis | n/a | n/a | ✔ |
Raw Event Telemetry | n/a | n/a | ✔ |
Remediation |
|||
Remote Endpoint Management Shell | n/a | n/a | ✔ |
Custom Remediation | ✔ | ✔ | ✔ |
Ransomware Recovery | n/a | n/a | ✔ |
Management |
|||
Centralized Policy Management | ✔ | ✔ | ✔ |
On-premise Management Server | ✔ | n/a |
n/a |
Cloud-based Roaming Support | ✔ | ✔ | ✔ |
Simple and Intuitive Cloud-based Console | n/a |
✔ | ✔ |
Web-based Responsive Console | n/a |
✔ | ✔ |
Other Features |
|||
Management Reporting | ✔ | ✔ | ✔ |
Two-factor authentication | n/a | ✔ | ✔ |
Partner Features (via VIPRE Site Manager) |
|||
Multi-tenancy | n/a | ✔ | ✔ |
Self-service Tenant Creation | n/a | ✔ | ✔ |
SSO to Tenant Sites | n/a | ✔ | ✔ |
Shared Policies | n/a | ✔ | ✔ |
We also offer VIPRE Endpoint MDR, a service in which our team of security experts will monitor your console 24 hours a day, seven days a week, 365 days a year to react to any new incidents, and then will quickly triage, investigate, and provide remediation guidance to your internal teams.
Read more about VIPRE Endpoint MDR
Large and Small Migrations
Not all migration projects will proceed in the same way. Some projects are smaller and low-risk, while others are more complex. This guide will show you how to be successful with large, complex migrations. However, many steps can be simplified or even skipped if they are not necessary for your particular project.
Part of your migration planning includes a review of the entire process, where you can get an idea of which parts of the migration you might not need to perform.
VIPRE Endpoint Migrator
VIPRE Endpoint Migrator is a tool we created to handle migrating your existing VIPRE Endpoint Security Server settings and agents to one of our VIPRE Cloud solutions. It provides the quickest and easiest migration of your policies, exclusions, and agents. Using Endpoint Migrator reduces the number of steps required to complete a successful migration.
Important
VIPRE Endpoint Migrator is optimized for Windows-based agents only. Mac agents are not currently supported.
A Multi-step Process
Whether you are migrating from a current VIPRE Server-based installation or another endpoint security solution, the migration process consists of these high-level steps: Plan > Prepare > Execute.
Migration Steps | Description |
---|---|
Step 1: Planning your migration |
Assess the state of your current environment and the scope of the transition. Will you migrate all at once or in stages across several days or weeks? |
Step 2: Preparing for your migration |
The most comprehensive step includes performing a device inventory, identifying and converting custom settings, policies and exclusions, and all other pre-execution work. |
Step 3: Executing the migration | The actual upgrade of agents to the new solution; includes tuning, testing, and verification. |
Important Links
Click the appropriate button below to start, continue, or complete your migration.
Step 1: Planning your Migration
Carlos Rios
Comments