Protegent 360- Complete Security Software

Size: px
Start display at page:

Download "Protegent 360- Complete Security Software"

Transcription

1 Protegent 360- Complete Security Software It s Time to Think Beyond Anti-Virus Anti-virus, Internet Security and total security are common words describing security software, but only for Internet threats. The new buzz word, complete security is on priority from the broader aspect for individual users and enterprise users. Complete Security not only means protection from Internet Threats but also Protection from data theft, unethical activity and physical theft! The word Protegent is deciphered from protégée ( To Protect in French). Complete security is what is offered in Unistal s Protegent360. Protegent360 encompasses internet threats and data safety through its six modules, Internet Security, Activity Monitoring, Port Locker,Locate Laptop,Crash Proof and SysBoost. Protegent Internet security designed for countering Internet threats is simple to use yet a sophisticated protection for all kinds of spyware, malware, e-threats, root kit and Anti-phishing. Protegent internet security boasts of the world biggest antivirus database engine. The real challenge is to take maximum efficiency from your subordinates. It has also become important to keep our machine safe from unethical Activities in our absence. Activity Monitoring and Reporting helps us in keeping the log of complete work done on a computer. This module reports all the unethically defined activities and send s reports directly to your . This also helps the organizations to enhance the activity of their staff by 20% as now they are aware that the entire work log is going via to their boss restricting them not to do personal chat, web browsing, playing games etc. Do we parents need to monitor our teens and pre-teens? It s a debatable question. But parents need not be of the nagging type now as they can have tools that could assist them through monitoring all their computer/ internet activities via Protegent 360 s Activity Monitoring & Reporting module. Keeping your data safe and protected is a challenge for each individual and organization. In today s world we require Controlling, monitoring and preventing the flow of data from the computer. Port locker a data leakage prevention module allows you to protect the flow of data from all the ports leaving no chance of data theft. This module is also equipped with filtering, so user can not send files/ mails which are not authorized by the organization. You can make Pen drives white listed or read only for the computers within your organization. In case if the laptop is lost, missing or stolen, Locate Laptop module helps in finding it the moment it gets connected to Internet. It s ability to find out the location from the IP with which it is connected to Internet helps in physical theft prevention of the Laptop. If Laptop does not get connected to Internet for a specified time, this module automatically encrypts the important data folder and makes it unusable for others. The Crash Proof / Data Loss Prevention feature of Protegent complete security software creates the image of our systems data, Image of file. Crash Proof helps the user to keep the updated backup of

2 data. This Software is designed to keep the image of the file indexes/ disk properties and it keeps updating them at regular intervals Sysboost is system tuneup software which is easy to use and developed for Microsoft Windows which helps to manage, maintain, optimize a computer system. It improves bootup time and overall performance by cleaning junk registry, junk files and folders, temporary internet files and by performing defragmentation of drives. Unistal s Protegent360, the complete security software covers all the six aspects of complete security. This is feature rich software beyond comparison. Protegent powers up 60% more features than any other nearest competitive software. The free trail software can be downloaded from For more details contact marketing@unistal.com. Description and Features of Protegent360 Modules Protegent Internet Security Protegent internet Security keeps your Internet-connected family safe. The antivirus solution provides high-end proactive protection from deadliest viruses, spyware, hackers and other e-threats. Protegent internet Security is time tested antivirus solution and known for its superior quality and effectiveness. It s hourly virus signature update module always protects you from latest viruses. Antivirus & Antispyware Protegent protects your computer from all kinds of Viruses, Trojans, Spywares, Rootkits, Malwares. It helps you to keep your system clean and healthy. Antispam Antispam feature blocks unwanted mails before it reaches your Inbox. Entertainment Mode Entertainment Mode temporarily modifies protection settings. It minimizes their impact on system performance. Setting Protection Setting protection feature helps you to protect your settings with a password, So that no one can change or modify the settings even if the other user has the admin rights. Active Virus Control Active Virus Control continuously monitors the applications running on the computer. It looks for malware and other unethical objects.

3 Hourly Update Personal Data Filter Protegent Internet security software takes updates every hour and protects our system from new viruses Prevents critical data, such as your social security number, from leaving your computer. Web Control Protect against online risk and block internet clutter USB Block Combats or blocks USB device auto-run vulnerability and you can also block USB access Anti-Phishing Anti-phishing feature blocks all the web pages which are supporting virus scams and personal data phishing attempts File and Folder Block One Click Removable Device Scan File and Folder block feature will make your personal file and folder inaccessible without users permission Protegent Internet Security will instantly monitors your USB as soon as you plugged it in your system. Website and Add Blocking Blocks Website & Ad on the basis of keyword and names as defined by the user

4 Activity Monitoring & Reporting Activity Reporter is a very important tool to monitor the activities of all computer users. It records and reports every key stroke/ every activity on the computer or internet and report is generated and ed on regular basis. The unique feature of Activity Reporter to Whitelist and blacklist applications would enable you to monitor more effectively. The various options of reporting along with the different formats of reporting would ensure monitoring is effective and keep the network more secured. The features of Activity Reporter would definitely act as a foil for anyone to do any fraudulent activities in the organization. It helps the user to find out if any unwanted activity has taken place in his absence. It also helps parents to find out the activity of their children to guide them to right direction. Monitor Internet Activity Captures all Internet activity with features of Blacklist and White list Blacklist- Internet activities (web sites) which are added in this list are monitored and be visible in alerts. White list- Internet activities which are added in this list are ignored and not visible in alerts. Monitor Screenshots Capture the Screen shot within a specified time Interval or on every mouse click. Monitor Keystrokes Monitor Application Activity Captures all key strokes. Intercept DOS-box and Java chat Keystrokes. Captures all system application activity with features of Blacklist and White list Blacklist- All the application activities that are added will get captured and be visible in alerts. White list- All the application activities that are added in this list, are ignored and not visible in alerts.

5 Monitor Chat Activity Captures ICQ, Miranda, Skype, Google Talk, MSN, AIM, AOL, Yahoo, QIP Chats Monitor Clipboard Activity User Login Reporting Captures Clipboard content You can get the login and logout details of each and every user User wise Reporting You can get reports of each and every user account by their user name. Port Locker Port Locker allows the user to safeguard data/files from unauthorized access. It prevents vital & important data to be transferred from one PC to another using Flash drive, DVD/CD writers, PCMCIA ports, Ethernet ports, Printer ports, Infrared ports and Bluetooth ports. It provides the Options to lock/unlock single or multiple ports with authorized password. It allows user to lock ports with different lock type options as permanent, specific time duration (scheduled block) and when the computer remains idle or untouched. It displays the alert as soon as an unauthorized action is performed against the locked ports. It provides complete log related to Permanent Blocked, Schedule Blocked or Un-Blocked Ports with actions performed including changes in settings, locking and unlocking the ports, setting scheduler etc. Users can Whitelist one or more pen drives to be allowed on the system. You can also make your USB port read only so data can only be transferred from pen drive to system. It provides the file transfer log through USB ports. Block ports White listing of Authorized USB devices USB read only feature File Transfer logs from & to USB Block /Unblock as per schedule or block port when system idle You can block all the ports with the help of Port Locker, to prevent your system from unauthorized access. You can block USB port, Bluetooth port, Infrared port, IEEE 1394 port, Network Adaptors port. Unique feature of White listing the authorized USB by using unique hardware ID of the device. Option of assigning USB read only setting to white listed and non white listed USB mass storage device. File transfer logs will show the reports of file transferred to and from USB device and also show the reports of file added, removed, renamed & modified. Multiple or Single ports can be blocked permanently, scheduled or even if you leave your system idle. Only

6 Block CD/DVD Block Printer Block/Unblock Single/All Ports authorized user can unblock the Port by using the password. Removable or Inbuilt CD/DVD ROM can be blocked by blocking CD/DVD ROM port, no one will be able to read or write the CD/DVD from the system. No Print command will work when Printer port is blocked. You can block/ unblock Multiple or single port in one shot. Locate Laptop Locate Laptop keeps a track of laptop's location whenever laptop gets connected to internet. What is lost is not just the laptop, but also the valuable, sensitive and creative data in it. It contains a smart agent, designed to collect and transmit critical data needed to pinpoint its location to identify the unauthorized user in case of a theft. It works in a stealth mode and can also silently inform you, about the location of your employee's laptop! Predefined settings allow the user to encrypt classified files and folders whenever laptop is not connected to internet for specified period or is detected stolen. It provides a secure web page for every user to monitor the Location, IP Address, and Internet Service Provider with date and time. It allow user to submit Theft Report online and provides regular Status Updates of laptop location on . Laptop/ User Tracking Automated Data Encryption Tamper Proof Reporting Secure Webpage for every user to Keep (monitor) a close eye on movement of person with the designated laptop e.g. company employee. Remotely launch the data encryption module on predefined sensitive files and folders. Encrypts Data even if laptop is not connected to Internet for particular period. Reports on server contain information on date, time, Public IP. Location, country, state, city, ISP, Longitude & Latitude. No human intervention for reports. Crash Proof The Crash Proof / Data Leakage Prevention feature of Protegent complete security software creates the image of our systems data, Image of file. Crash Proof helps the user to keep the updated backup of data. This Software is designed to keep the image of the file indexes/ disk properties and it keeps updating them at regular intervals. In this business world, data volume have increased hence the computer dependency has also increased. As the dependency increases the downtime increases as well

7 due to data loss and the data lost cost us more than the recreation cost. Data Recovery cannot provide you the satisfactory results every time. Deleted file/ folder recovery Unformat formatted drives Repair Corrupted / Deleted Partition The software supports deleted file /folder recovery. It can recover the deleted/ lost files if they are deleted from your PC, even if they are not present in recycle bin. The software can even unformat the whole drive. With the help of this product the user can revive the file system from its replica, which is stored in some other location of the hard disk. With this software you can repair or build back the corrupted/ deleted partition, which may occur due to virus attacks or accidental deletion. Revive incase of FAT/MFT Corruption The software has a feature to build back your FAT/ MFT file system. It supports 100% recovery in case your file system gets corrupt. SysBoost The SysBoost feature of Protegent complete security software helps you to manage,maintain,optimize your computer system. SysBoost consist of six features which are Select and Wipe,Select Extensions,Defrag Drive,Internet Wipe,Registry Clean and Registry Restore.It improves the bootup time of the system by deleting junk registries,junk files and internet history.backup of unwanted files can be taken.by using this backup,files can be restored.sysboost analyses the system and brings out all the unwanted registries. Select and Wipe Select the files/folders you want to delete.selected files get deleted permanently. Backup and Wipe takes the backup of selected file, with this backup we can recover our deleted file. Select Extensions Deletes file with the mentioned extensions(txt,bmp,pdf etc) permanently. Backup and Wipe takes the backup of mentioned extensions, with this backup we can recover our deleted file.

8 Defrag Drive Internet Wipe In this feature Defragmentation of drive takes place. Increases the throughput of the system. Analyses the Drive and gives information weather the drive needs to be defragmented or not. Clears all the temporary internet files, internet cookies and internet history permanently. Registry Clean Scans the system and gives the accurate information of all the unwanted registries.software locations,shared DLLs,custom control,help files,startup items,deleted applications,most recently run list are the available categories of registries. Registry Restore Deletes unwanted registries can be restored by using this option. System Requirements You may install only on computers running the following operating systems: Windows XP (32-bit) Windows Vista with Service Pack 1 Windows 7 Windows 8 Before installation, make sure that your computer meets the minimum system requirements. Note: To find out the Windows operating system your computers is running and hardware information, right-click My Computer on the desktop and then select Properties from the menu. Minimum System Requirements 1.8 GB available free hard disk space (at least 800 MB on the system drive) 800 MHz processor 512 MB of memory (RAM)

9 Recommended System Requirements 2.8 GB available free hard disk space (at least 800 MB on the system drive) Intel CORE Duo (1.66 GHz) or equivalent processor Memory (RAM): o 512 MB for Windows XP o 1 GB for Windows Vista, Windows 7, Windows 8 Experience a brighter tomorrow..today

Protegent 360- Complete Security Software

Protegent 360- Complete Security Software Protegent 360- Complete Security Software It s Time to Think Beyond Anti-Virus Anti-virus, Internet Security and total security are common words describing security software, but only for Internet threats.

More information

ESET SMART SECURITY 6

ESET SMART SECURITY 6 ESET SMART SECURITY 6 Microsoft Windows 8 / 7 / Vista / XP / Home Server Quick Start Guide Click here to download the most recent version of this document ESET Smart Security provides state-of-the-art

More information

McAfee Internet Security Suite Quick-Start Guide

McAfee Internet Security Suite Quick-Start Guide Enjoy a Worry Free Online Experience McAfee Internet Security Suite protects your PC, identity and online experience. It also includes PC and network tools, plus McAfee SiteAdvisor for safe surfing. Internet

More information

Avira System Speedup. HowTo

Avira System Speedup. HowTo Avira System Speedup HowTo Table of Contents 1. Introduction... 4 1.1 What is Avira System Speedup?...4 2. Installation... 5 2.1 System Requirements...5 2.2 Installation...5 3. Using the program... 8 3.1

More information

ESET SMART SECURITY 9

ESET SMART SECURITY 9 ESET SMART SECURITY 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET Smart Security is all-in-one Internet security

More information

Avira System Speedup Release Information

Avira System Speedup Release Information Release Information Avira System Speedup is a new PC optimization and error repair utility that improves the performance of your PC. Regularly cleaning your computer could save you costly maintenance fees.

More information

Outpost Pro PC security products Security Suite, Antivirus, Firewall

Outpost Pro PC security products Security Suite, Antivirus, Firewall agnitum.com PC security products Security Suite,, Firewall Version 9 The Outpost product line including Outpost Security Suite Pro, Outpost Pro, and Outpost Firewall Pro protects against all types of malware,

More information

Kaspersky Internet Security 2012: Reviewer s Guide

Kaspersky Internet Security 2012: Reviewer s Guide Kaspersky Internet Security 2012: Reviewer s Guide Index 1 Introduction...3 2 Key advantages...3 2.1 Proactive protection against unknown threats 3 2.2 Internet security 4 2.3 Safe Run 4 2.4 On the Way

More information

Kaspersky Internet Security 2014: Reviewer s Guide

Kaspersky Internet Security 2014: Reviewer s Guide Kaspersky Internet Security 2014: Reviewer s Guide Index 1 Introduction... 3 2 Key Benefits... 3 2.1 Real-time protection against all Internet threats 3 2.2 Secure online banking and shopping 4 2.3 Proactive

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003 Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while

More information

Bitdefender Total Security 2015 User's Guide

Bitdefender Total Security 2015 User's Guide USER'S GUIDE Bitdefender Total Security 2015 User's Guide Publication date 11/17/2014 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

Bitdefender Internet Security 2015 User's Guide

Bitdefender Internet Security 2015 User's Guide USER'S GUIDE Bitdefender Internet Security 2015 User's Guide Publication date 10/16/2014 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

Auslogics BoostSpeed 5 Manual

Auslogics BoostSpeed 5 Manual Page 1 Auslogics BoostSpeed 5 Manual [ Installing and using Auslogics BoostSpeed 5 ] Page 2 Table of Contents What Is Auslogics BoostSpeed?... 3 Features... 3 Compare Editions... 4 Installing the Program...

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

Desktop or Laptop Diagnostic $49.99

Desktop or Laptop Diagnostic $49.99 Desktop or Laptop Diagnostic $49.99 Important: For online service we need a high-speed internet connection and a working computer Expert Troubleshooting $49.99 On-Line, MSD Office On-Site Computer hardware

More information

User's Guide. Copyright 2013 Bitdefender

User's Guide. Copyright 2013 Bitdefender User's Guide Copyright 2013 Bitdefender Bitdefender Total Security User's Guide Publication date 08/12/2013 Copyright 2013 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

Desktop and Laptop Security Policy

Desktop and Laptop Security Policy Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious

More information

LevelOne MUS-1001. 1GB Smart Flash. User Manual V1.0.0-0610

LevelOne MUS-1001. 1GB Smart Flash. User Manual V1.0.0-0610 LevelOne MUS-1001 1GB Smart Flash User Manual V1.0.0-0610 CONTENT CHAPTER 1 INTRODUCTION...4 1.1 About this Manual...4 1.2 Support Services...5 CHAPTER 2 PRODUCT OVERVIEW...6 2.1 Package Contents...6 2.2

More information

ESET NOD32 ANTIVIRUS 9

ESET NOD32 ANTIVIRUS 9 ESET NOD32 ANTIVIRUS 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus provides state-of-the-art protection

More information

ESET NOD32 ANTIVIRUS 8

ESET NOD32 ANTIVIRUS 8 ESET NOD32 ANTIVIRUS 8 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus

More information

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

When you listen to the news, you hear about many different forms of computer infection(s). The most common are: Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,

More information

avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide

avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide 1 Welcome to avast! Internet Security 7.0 The new avast! Antivirus 7.0 brings a range of new features and improvements which make it even faster and even

More information

Crash Proof - Data Loss Prevention

Crash Proof - Data Loss Prevention Crash Proof - Data Loss Prevention Software Crash Proof - Data Loss Prevention Crash Proof is data loss prevention software which once installed revives 100% data in the event of a data loss situation.

More information

User's Guide. Copyright 2010 BitDefender

User's Guide. Copyright 2010 BitDefender User's Guide Copyright 2010 BitDefender BitDefender Antivirus Pro 2011 User's Guide Published 2010.07.30 Copyright 2010 BitDefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

A+ Practical Applications Solution Key

A+ Practical Applications Solution Key A+ Practical Applications Solution Key Module 1 Assignment: Introducing Microsoft Windows - answer the following questions: 1. What attributes are available in the NTFS file system that are not available

More information

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

ViRobot Desktop 5.5. User s Guide

ViRobot Desktop 5.5. User s Guide ViRobot Desktop 5.5 User s Guide ViRobot Desktop 5.5 User s Guide Copyright Notice Copyright 2007 by HAURI Inc. All rights reserved worldwide. No part of this publication or software may be reproduced,

More information

Ad-Aware Management Server Installed together with Ad-Aware Business Client... 19 Ad-Aware Update Server... 19 Before You Start the Deployment...

Ad-Aware Management Server Installed together with Ad-Aware Business Client... 19 Ad-Aware Update Server... 19 Before You Start the Deployment... Table of Contents Using This Guide... 9 Purpose and Intended Audience... 9 How to Use This Guide... 9 Conventions Used in This Guide... 10 Typographical Conventions... 10 Admonitions... 10 About Ad-Aware

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

SystemTech AntiSpyware Manual

SystemTech AntiSpyware Manual Summitsoft Corporation SystemTech AntiSpyware Manual This guide is distributed with software that includes an end user agreement, this guide, as well as the software described in it, is furnished under

More information

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109 K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete

More information

SONAR RESELLER TRAINING. Technical Training.. Slides 2 25 Sales Training. Slides 26 35

SONAR RESELLER TRAINING. Technical Training.. Slides 2 25 Sales Training. Slides 26 35 SONAR RESELLER TRAINING Technical Training.. Slides 2 25 Sales Training. Slides 26 35 System Requirements SONAR consists of a desktop agent and a host server where the database resides. Typically, we

More information

User's Guide. Copyright 2012 Bitdefender

User's Guide. Copyright 2012 Bitdefender User's Guide Copyright 2012 Bitdefender Bitdefender Parental Control User's Guide Publication date 2012.06.05 Copyright 2012 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues.

FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. The latest tactic currently being used by malware creators

More information

BabyWare Imperial PC Software

BabyWare Imperial PC Software Overview (see page 1) Things You Should Know (see page 1) Getting Started (see page 2) Licenses and Registration (see page 6) Usernames Passwords and Login (see page 7) BabyWare Imperial PC Software Overview

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows : Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows

More information

KASPERSKY SMALL OFFICE SECURITY (Version 3) Features List

KASPERSKY SMALL OFFICE SECURITY (Version 3) Features List KASPERSKY SMALL OFFICE SECURITY (Version 3) Features List Contents Overview... 3 Features list for Personal Computer and File Server... 3 Computer Security... 3 Internet Security... 4 Backup & Restore...

More information

Carry it Easy. User Guide

Carry it Easy. User Guide Carry it Easy User Guide User Manual Version 3.2 2004-2010 CoSoSys Ltd. Carry it Easy User Manual Table of Contents Table of Contents... I 1. Introduction... 1 2. System Requirements... 1 3. Installation...

More information

Kaspersky Small Office Security User Guide

Kaspersky Small Office Security User Guide Kaspersky Small Office Security User Guide APPLICATION VERSION: 4.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding

More information

How to Use Windows Firewall With User Account Control (UAC)

How to Use Windows Firewall With User Account Control (UAC) Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security

More information

Simnet Registry Repair 2011. User Guide. Edition 1.3

Simnet Registry Repair 2011. User Guide. Edition 1.3 Simnet Registry Repair 2011 User Guide Edition 1.3 1 Content Getting Started...3 System requirements...3 Minimum system requirements...3 Recomended system specifications...3 Program Overview...4 About

More information

Kaspersky Internet Security

Kaspersky Internet Security Kaspersky Internet Security User Guide APPLICATION VERSION: 16.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding

More information

support@escanav.com http://forums.escanav.com escan Mobile Security for Android

support@escanav.com http://forums.escanav.com escan Mobile Security for Android support@escanav.com http://forums.escanav.com escan Mobile Security for Android Introduction 3 Features added 3 System Requirements 3 Installation 4 Features of escan Mobile Security for Android 4 Antivirus

More information

Acronis AntiVirus 2010 User's Guide

Acronis AntiVirus 2010 User's Guide User's Guide Acronis AntiVirus 2010 User's Guide Published 2010.02.02 Copyright 2010 Acronis Legal Notice All rights reserved. No part of this book may be reproduced or transmitted in any form or by any

More information

BitDefender Client Security Workstation Security and Management

BitDefender Client Security Workstation Security and Management BitDefender Client Security Workstation Security and Management BitDefender Client Security is an easy to use business security and management solution, which delivers superior proactive protection from

More information

BULLGUARD BAckUp GUIDE

BULLGUARD BAckUp GUIDE BULLGUARD backup GUIDE CONTENTS BullGuard Backup introduction page 3 Installing BullGuard Backup page 6 Uninstalling BullGuard Backup page 11 Registering BullGuard Backup: creating an account page 12 Running

More information

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers

More information

SonicWALL Email Security Quick Start Guide. Version 4.6

SonicWALL Email Security Quick Start Guide. Version 4.6 SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more

More information

Upgrading Client Security and Policy Manager in 4 easy steps

Upgrading Client Security and Policy Manager in 4 easy steps Page 1 of 13 F-Secure White Paper Upgrading Client Security and Policy Manager in 4 easy steps Purpose This white paper describes how to easily upgrade your existing environment running Client Security

More information

Using WMI Scripts with BitDefender Client Security

Using WMI Scripts with BitDefender Client Security Using WMI Scripts with BitDefender Client Security Whitepaper Copyright 2009 BitDefender; Table of Contents 1. Introduction... 3 2. Key Benefits... 4 3. Available WMI Script Templates... 5 4. Operation...

More information

Spyware Doctor Enterprise Technical Data Sheet

Spyware Doctor Enterprise Technical Data Sheet Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

Bitdefender Total Security 2016 User's Guide

Bitdefender Total Security 2016 User's Guide USER'S GUIDE Bitdefender Total Security 2016 User's Guide Publication date 01/28/2016 Copyright 2016 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers 2012. Your Interactive Guide to the Digital World

Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers 2012. Your Interactive Guide to the Digital World Chapter 8 Types of Utility Programs and Operating Systems Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define system software and identify the two types of

More information

Why you need. McAfee. Multi Acess PARTNER SERVICES

Why you need. McAfee. Multi Acess PARTNER SERVICES Why you need McAfee Multi Acess PARTNER SERVICES McAfee Multi Access is an online security app that protects all types of devices. All at once. The simple monthly subscription covers up to five devices

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

ABOUT LAVASOFT. Contact. Lavasoft Product Sheet: Ad-Aware Free Antivirus+

ABOUT LAVASOFT. Contact. Lavasoft Product Sheet: Ad-Aware Free Antivirus+ ABOUT LAVASOFT Company Overview Lavasoft is the original anti-malware company, creating award-winning, free security and privacy software since 1999. Born of the belief that online security should be available

More information

COMODO System-Cleaner

COMODO System-Cleaner Creating Trust Online COMODO System-Cleaner Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 United States. User Guide Table of Contents 1 Table of Contents 1 COMODO System-Cleaner-

More information

Anti- Virus Protection Get real-time protection against viruses, worms, Trojans and rootkits.

Anti- Virus Protection Get real-time protection against viruses, worms, Trojans and rootkits. SecureIT Plus PC Security To learn more about Security Coverage s suite of security features, select from the Quick Links that follow. This document can also be printed, or saved to your desktop and used

More information

Internet Security Suite

Internet Security Suite Internet Security Suite with Cloud Security 24x7 FREE Online Technical Support support@escanav.com forums.escanav.com Home and Small Office Edition About this Guide This quick reference guide gives you

More information

Kaspersky Endpoint Security 10 for Windows Administrator's Guide

Kaspersky Endpoint Security 10 for Windows Administrator's Guide Kaspersky Endpoint Security 10 for Windows Administrator's Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product! We hope that you will find this documentation

More information

Understanding Backup and Recovery Methods

Understanding Backup and Recovery Methods Lesson 8 Understanding Backup and Recovery Methods Learning Objectives Students will learn to: Understand Local, Online, and Automated Backup Methods Understand Backup Options Understand System Restore

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

Using Computer Surveillance to Watch Corporate Security and Employee Performance

Using Computer Surveillance to Watch Corporate Security and Employee Performance Using Computer Surveillance to Watch Corporate Security and Employee Performance AtomPark Software Inc. 2008 2008. AtomPark Software Inc. All rights reserved 1 Using Computer Surveillance to Watch Corporate

More information

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business is an easyto-use, all-in-one suite that secures your critical business assets and information against today s complex

More information

escan Corporate Edition User Guide

escan Corporate Edition User Guide Anti-Virus & Content Security escan Corporate Edition (with Hybrid Network Support) User Guide www.escanav.com sales@escanav.com The software described in this guide is furnished under a license agreement

More information

ESET Mobile Security Windows Mobile

ESET Mobile Security Windows Mobile ESET Mobile Security Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3

More information

DriveLock and Windows 8

DriveLock and Windows 8 Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

USB Flash Memory TransMemory-EX II TM

USB Flash Memory TransMemory-EX II TM USB Flash Memory TransMemory-EX II TM Security Software User Manual TOSHIBA Corporation Semiconductor & Storage Products Company Contents Chapter 1: Introduction... 2 Chapter 2: System Requirements...

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

In this chapter you will find information on the following subjects:

In this chapter you will find information on the following subjects: 17 1. From XP to Vista Microsoft, the creator of Windows, has published various versions of the Windows operating system over the past two decades. Windows Vista is the latest version, the successor to

More information

User's Guide. Copyright 2013 Bitdefender

User's Guide. Copyright 2013 Bitdefender User's Guide Copyright 2013 Bitdefender Bitdefender Internet Security User's Guide Publication date 08/12/2013 Copyright 2013 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

Sophos Endpoint Security and Control Help

Sophos Endpoint Security and Control Help Sophos Endpoint Security and Control Help Product version: 10.3 Document date: June 2014 Contents 1 About Sophos Endpoint Security and Control...3 2 About the Home page...4 3 Sophos groups...5 4 Sophos

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Course Outline Module 01: Foundations of Security Essential Terminologies Computer Security Why Security? Potential Losses Due to Security Attacks Elements of Security The

More information

Michelle Vonderhaar June 23, 2010

Michelle Vonderhaar June 23, 2010 Michelle Vonderhaar June 23, 2010 PC Maintenance Checklist Back up any data BEFORE you perform any PC maintenance Check Hard Drive for free space (for comparison after clean up) Perform Disk Clean-up (use

More information

Kaseya 2. User Guide. Version 1.1

Kaseya 2. User Guide. Version 1.1 Kaseya 2 AntiMalware User Guide Version 1.1 September 30, 2013 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULA as updated

More information

Sophos Endpoint Security and Control Help. Product version: 11

Sophos Endpoint Security and Control Help. Product version: 11 Sophos Endpoint Security and Control Help Product version: 11 Document date: October 2015 Contents 1 About Sophos Endpoint Security and Control...5 2 About the Home page...6 3 Sophos groups...7 3.1 About

More information

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations.

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations. USER Manual Table of Contents Getting Started What is PC Matic?...4 System Requirements....4 Launching PC Matic.5 How to Purchase a PC Matic Subscription..6 Additional Installations. 6 Registration...6

More information

ESET Mobile Security Windows Mobile. Installation Manual and User Guide

ESET Mobile Security Windows Mobile. Installation Manual and User Guide ESET Mobile Security Windows Mobile Installation Manual and User Guide Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1 Installation...3

More information

Prerequisites Guide. Version 4.0, Rev. 1

Prerequisites Guide. Version 4.0, Rev. 1 Version 4.0, Rev. 1 Contents Software and Hardware Prerequisites Guide... 2 anterradatacenter Version selection... 2 Required Software Components... 2 Sage 300 Construction and Real Estate ODBC... 2 Pervasive

More information

Safe internet: Getting Started Guide

Safe internet: Getting Started Guide Safe internet: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial Configuration

More information

Loophole+ with Ethical Hacking and Penetration Testing

Loophole+ with Ethical Hacking and Penetration Testing Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,

More information

PC Diet and fitness plan

PC Diet and fitness plan PC Diet and fitness plan Revised Apr 2013 Speed up your PC Regain lost storage space Clean out Bugs and viruses Improve your web experience Reduce maintenance costs and downtime This PC Diet and fitness

More information

FOR MAC. Quick Start Guide. Click here to download the most recent version of this document

FOR MAC. Quick Start Guide. Click here to download the most recent version of this document FOR MAC Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against malicious code. Based on

More information

Kaspersky Internet Security User Guide

Kaspersky Internet Security User Guide Kaspersky Internet Security User Guide APPLICATION VERSION: 15.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding

More information

For Businesses with more than 25 seats. www.eset.com

For Businesses with more than 25 seats. www.eset.com For Businesses with more than 25 seats www.eset.com ESET Endpoint Protection Standard Whether your business is just starting or Simple and Straightforward established, there are a few things you expect

More information

www.agnitum.com Getting Started Copyright 2010 Agnitum Ltd. All rights reserved.

www.agnitum.com Getting Started Copyright 2010 Agnitum Ltd. All rights reserved. www.agnitum.com Getting Started Copyright 2010 Agnitum Ltd. All rights reserved. Abstract This document provides a quick start reference to orientate a first time user in the basic concepts and operations

More information

Basic Computer Maintenance

Basic Computer Maintenance Basic Computer Maintenance Presented by East Central Regional Library The Institute of, a Federal Agency that fosters innovation, leadership and a lifetime of learning, in conjunction with State Library

More information

1. System Requirements

1. System Requirements BounceBack Data Transfer 14.2 User Guide This guide presents you with information on how to use BounceBack Data Transfer 14.2. Contents 1. System Requirements 2. Attaching Your New Hard Drive To The Data

More information

Avira Rescue System. HowTo

Avira Rescue System. HowTo Avira Rescue System HowTo Table of contents 1. Introduction... 3 2. System Requirements... 4 3. Product availability... 4 4. Product features... 5 5. Using the Rescue System... 6 5.1 The BIOS setup...6

More information

Selected Windows XP Troubleshooting Guide

Selected Windows XP Troubleshooting Guide 1 Selected Windows XP Troubleshooting Guide To locate lost files: Compiled by: Jason M. Cohen Check these locations to locate lost files: The My Documents folder Click Start, and then click My Documents.

More information

MySupport. End User Guide. Document Version: 1.3

MySupport. End User Guide. Document Version: 1.3 MySupport End User Guide Document Table of Contents Table of Contents... 2 Introduction... 3 What is MySupport?...3 System Requirements...3 MySupport Application... 4 Installing MySupport... 4 System Tests...5

More information

User Manual. Copyright Rogev LTD

User Manual. Copyright Rogev LTD User Manual Copyright Rogev LTD Introduction Thank you for choosing FIXER1. This User's Guide is provided to you to familiar yourself with the program. You can find a complete list of all the program's

More information

3 Easy Steps to Get Started

3 Easy Steps to Get Started Quick Start Guide Contents 1. What is icafe Manager?... 4 1.1. Server... 4 1.2. Client Terminal... 4 2. Downloading, Registering & Activating Cafe Code... 5 2.1. Downloading icafe Manager:... 5 2.2. Registering

More information