LogMeIn Central
Security Module

3AD2F57A-91D0-40C6-8681-409F9149B112-png

Mitigate the risk of cyber threats

Secure your endpoints with LogMeIn Central’s add-on Security Module

Try it for free

Ready to Purchase? Buy Now.

You can use our LogMeIn Central ROI Calculator to customize your solution and see how much time and money you could save here

Securing your endpoints has never been easier

As cyber-attacks become more and more pervasive, we are continuously being exposed to a variety of threats, such as malware, ransomware, and spyware, which need continuous protection. In a dangerous online world, you need the best protection available. LogMeIn’s Security Module includes critical Patch Management (Windows and Third-Party Application Updates), Antivirus Management, and world-class LogMeIn Antivirus software powered by Bitdefender.

security-png

Defend Against Harmful Threats

Leverage the antivirus solution of your choice or utilize LogMeIn Antivirus powered by Bitdefender to protect your business and customers from known and unknown threats.

Stay Up to Date

Address software vulnerabilities securely and efficiently. With the Security Module add-on, you can schedule and automate critical Windows and Application updates to stay ahead and save time in a single pane of glass view

Control Your Protection Strategy

Monitor and manage antivirus software to ensure your endpoints are protected with world-class security and control. View existing computer issues, manage deployed antivirus from a single dashboard, and identify critical updates.

Take a look at a demo of LogMeIn Central’s Security Module

LogMeIn Antivirus Powered by Bitdefender

Protect your company and clients from viruses, spyware, malware, phishing attacks, and sophisticated online threats.

  • Anti-Phishing
  • Reporting
  • Installation & Activation
  • Ransomware Protection
  • Suspend Capabilities
  • Exclusions
  • Update Virus Definition

Take a look at our LogMeIn Antivirus Feature Snapshot to learn more.

061CFD20-C69E-40E8-8B8F-B29C7C04C625-svg

Anti-Malware

Schedule quick local, full, and on-access scans to examine endpoints in depth for viruses, including memory, hard drive, file systems, and external devices connected to the computer

6A0FEE54-039F-4055-A5CB-74D5BAFF95B3-svg

Real Time Protection (RTP)

Inspects the computer’s memory and file system continuously for threats during user interaction

D164A6B8-5037-4668-B94E-609EFBF612E7-svg

Firewall

Allow access for known, legitimate applications while safeguarding your system

FA9BDE14-3A31-46DC-AC58-EB5789A2F517-svg

Multiple Policy Assignment

Configure settings centrally or differently for groups of computers, including scanning profiles and hiding antivirus from the end user

6D21A079-1220-4C4E-8045-4B1EF5FE7EFC-svg

Traffic Scan

Scans HTTP traffic for Malware

4C2B38D6-25FD-49C6-A5D0-F2F6EA82D6B8-svg

Device Control

Select to automatically scan or block USB drives when connected to your computers

Additional Security Module Features

Bitmap15xpng

Patch Management

Quickly identify vulnerable third-party applications, perform or schedule multiple updates simultaneously, and automatically deploy patches to keep your software up-to-date and protected against threats

Windows & Application Updates

Centrally manage and view your Windows updates and patches, and gain flexible, efficient control over your networks with automated and scheduled updates

Antivirus Management

Request status updates, view a list of threats, initiate scans, and manage the antivirus software you already have deployed or take advantage of our built-in antivirus license software to keep all your managed computers secure

The Risk of Cyber Threats is Growing Daily
97E59DE8-8179-4DF1-A5CB-5DD6CE1AF0AF-svg

Number of cyber-attack victims report that they could have proactively prevented their attack by installing an available patch1

79A37C95-6BFA-4C12-BD7F-15C7BBAB6284-svg

Total of small businesses that experience a cyber-attack go out of business within six months as a result2

8B33B1CF-37F0-401F-88CC-F24EFC608E43-svg

The average cost, in millions, of a cyberattack, which rose 27% in the past year. The annual cost is projected to be $6 trillion by 20213

  1. Ponemon Institute. ServiceNow Study. 2018
  2. Denver Post. “60% of small companies that suffer a cyber-attack are out of business within six months.” 2017
  3. Radware. Global Application & Network Security Report. 2018-2019
  4. Ponemon Institute. 2019 Global State of SMB Cybersecurity. 2019.
  5. FBI. Internet Crime Report. 2018
  6. IBM. IBM Security. 2020
stock-security-jpg

Security matters now more than ever.

Endpoint management solutions can help address the chronic ineffectiveness of endpoint security

See how

Read how 500 IT Professionals see Security at their companies:

Read now

Not convinced? Take a look at the potential cost of inactivity on cyber threats

Read now

Take a Look at Everything Central Has to Offer

Customize your LogMeIn Central subscription to fit the needs of your organization. Whether you need to mitigate the risk of cyber-threats, enable business critical IT automation, or gain better visibility into your endpoint infrastructure, LogMeIn Central offers functionality options to meet your needs.
base1svg

Central Base Plan

The most reliable RMM solution comes with HD remote access, the ability to manage users and devices, background access, file transfer, mobile access and much more.

Learn more about the Central Base plan
automation-svg

Automation Module

Automate routine IT tasks to increase productivity and optimize resource allocation through command line and PowerShell scripting, customizable alerts and more.

Learn more about Automation
4C420D5A-99EF-488C-8E1E-CF8B57EA6489-svg

Insight Module

Keep a constant pulse on your endpoint infrastructure with asset management, hardware and software inventory, and advanced reporting in a single pane of glass view.

Learn more about Insight

Ready to Get Started?

Simple and reliable remote access is only one click-away. Learn how Central can fit your needs today.

Try it for free Request a demo