Protegent 360- Complete Security Software It s Time to Think Beyond Anti-Virus Anti-virus, Internet Security and total security are common words describing security software, but only for Internet threats. The new buzz word, complete security is on priority from the broader aspect for individual users and enterprise users. Complete Security not only means protection from Internet Threats but also Protection from data theft, unethical activity and physical theft! The word Protegent is deciphered from protégée ( To Protect in French). Complete security is what is offered in Unistal s Protegent360. Protegent360 encompasses internet threats and data safety through its six modules, Internet Security, Activity Monitoring, Port Locker,Locate Laptop,Crash Proof and SysBoost. Protegent Internet security designed for countering Internet threats is simple to use yet a sophisticated protection for all kinds of spyware, malware, e-threats, root kit and Anti-phishing. Protegent internet security boasts of the world biggest antivirus database engine. The real challenge is to take maximum efficiency from your subordinates. It has also become important to keep our machine safe from unethical Activities in our absence. Activity Monitoring and Reporting helps us in keeping the log of complete work done on a computer. This module reports all the unethically defined activities and send s reports directly to your email. This also helps the organizations to enhance the activity of their staff by 20% as now they are aware that the entire work log is going via email to their boss restricting them not to do personal chat, web browsing, playing games etc. Do we parents need to monitor our teens and pre-teens? It s a debatable question. But parents need not be of the nagging type now as they can have tools that could assist them through monitoring all their computer/ internet activities via Protegent 360 s Activity Monitoring & Reporting module. Keeping your data safe and protected is a challenge for each individual and organization. In today s world we require Controlling, monitoring and preventing the flow of data from the computer. Port locker a data leakage prevention module allows you to protect the flow of data from all the ports leaving no chance of data theft. This module is also equipped with email filtering, so user can not send files/ mails which are not authorized by the organization. You can make Pen drives white listed or read only for the computers within your organization. In case if the laptop is lost, missing or stolen, Locate Laptop module helps in finding it the moment it gets connected to Internet. It s ability to find out the location from the IP with which it is connected to Internet helps in physical theft prevention of the Laptop. If Laptop does not get connected to Internet for a specified time, this module automatically encrypts the important data folder and makes it unusable for others. The Crash Proof / Data Loss Prevention feature of Protegent complete security software creates the image of our systems data, Image of file. Crash Proof helps the user to keep the updated backup of
data. This Software is designed to keep the image of the file indexes/ disk properties and it keeps updating them at regular intervals Sysboost is system tuneup software which is easy to use and developed for Microsoft Windows which helps to manage, maintain, optimize a computer system. It improves bootup time and overall performance by cleaning junk registry, junk files and folders, temporary internet files and by performing defragmentation of drives. Unistal s Protegent360, the complete security software covers all the six aspects of complete security. This is feature rich software beyond comparison. Protegent powers up 60% more features than any other nearest competitive software. The free trail software can be downloaded from www.protegent360.com. For more details contact marketing@unistal.com. Description and Features of Protegent360 Modules Protegent Internet Security Protegent internet Security keeps your Internet-connected family safe. The antivirus solution provides high-end proactive protection from deadliest viruses, spyware, hackers and other e-threats. Protegent internet Security is time tested antivirus solution and known for its superior quality and effectiveness. It s hourly virus signature update module always protects you from latest viruses. Antivirus & Antispyware Protegent protects your computer from all kinds of Viruses, Trojans, Spywares, Rootkits, Malwares. It helps you to keep your system clean and healthy. Antispam Antispam feature blocks unwanted mails before it reaches your Inbox. Entertainment Mode Entertainment Mode temporarily modifies protection settings. It minimizes their impact on system performance. Setting Protection Setting protection feature helps you to protect your settings with a password, So that no one can change or modify the settings even if the other user has the admin rights. Active Virus Control Active Virus Control continuously monitors the applications running on the computer. It looks for malware and other unethical objects.
Hourly Update Personal Data Filter Protegent Internet security software takes updates every hour and protects our system from new viruses Prevents critical data, such as your social security number, from leaving your computer. Web Control Protect against online risk and block internet clutter USB Block Combats or blocks USB device auto-run vulnerability and you can also block USB access Anti-Phishing Anti-phishing feature blocks all the web pages which are supporting virus scams and personal data phishing attempts File and Folder Block One Click Removable Device Scan File and Folder block feature will make your personal file and folder inaccessible without users permission Protegent Internet Security will instantly monitors your USB as soon as you plugged it in your system. Website and Add Blocking Blocks Website & Ad on the basis of keyword and names as defined by the user
Activity Monitoring & Reporting Activity Reporter is a very important tool to monitor the activities of all computer users. It records and reports every key stroke/ every activity on the computer or internet and report is generated and emailed on regular basis. The unique feature of Activity Reporter to Whitelist and blacklist applications would enable you to monitor more effectively. The various options of reporting along with the different formats of reporting would ensure monitoring is effective and keep the network more secured. The features of Activity Reporter would definitely act as a foil for anyone to do any fraudulent activities in the organization. It helps the user to find out if any unwanted activity has taken place in his absence. It also helps parents to find out the activity of their children to guide them to right direction. Monitor Internet Activity Captures all Internet activity with features of Blacklist and White list Blacklist- Internet activities (web sites) which are added in this list are monitored and be visible in alerts. White list- Internet activities which are added in this list are ignored and not visible in alerts. Monitor Screenshots Capture the Screen shot within a specified time Interval or on every mouse click. Monitor Keystrokes Monitor Application Activity Captures all key strokes. Intercept DOS-box and Java chat Keystrokes. Captures all system application activity with features of Blacklist and White list Blacklist- All the application activities that are added will get captured and be visible in alerts. White list- All the application activities that are added in this list, are ignored and not visible in alerts.
Monitor Chat Activity Captures ICQ, Miranda, Skype, Google Talk, MSN, AIM, AOL, Yahoo, QIP Chats Monitor Clipboard Activity User Login Reporting Captures Clipboard content You can get the login and logout details of each and every user User wise Reporting You can get reports of each and every user account by their user name. Port Locker Port Locker allows the user to safeguard data/files from unauthorized access. It prevents vital & important data to be transferred from one PC to another using Flash drive, DVD/CD writers, PCMCIA ports, Ethernet ports, Printer ports, Infrared ports and Bluetooth ports. It provides the Options to lock/unlock single or multiple ports with authorized password. It allows user to lock ports with different lock type options as permanent, specific time duration (scheduled block) and when the computer remains idle or untouched. It displays the alert as soon as an unauthorized action is performed against the locked ports. It provides complete log related to Permanent Blocked, Schedule Blocked or Un-Blocked Ports with actions performed including changes in settings, locking and unlocking the ports, setting scheduler etc. Users can Whitelist one or more pen drives to be allowed on the system. You can also make your USB port read only so data can only be transferred from pen drive to system. It provides the file transfer log through USB ports. Block ports White listing of Authorized USB devices USB read only feature File Transfer logs from & to USB Block /Unblock as per schedule or block port when system idle You can block all the ports with the help of Port Locker, to prevent your system from unauthorized access. You can block USB port, Bluetooth port, Infrared port, IEEE 1394 port, Network Adaptors port. Unique feature of White listing the authorized USB by using unique hardware ID of the device. Option of assigning USB read only setting to white listed and non white listed USB mass storage device. File transfer logs will show the reports of file transferred to and from USB device and also show the reports of file added, removed, renamed & modified. Multiple or Single ports can be blocked permanently, scheduled or even if you leave your system idle. Only
Block CD/DVD Block Printer Block/Unblock Single/All Ports authorized user can unblock the Port by using the password. Removable or Inbuilt CD/DVD ROM can be blocked by blocking CD/DVD ROM port, no one will be able to read or write the CD/DVD from the system. No Print command will work when Printer port is blocked. You can block/ unblock Multiple or single port in one shot. Locate Laptop Locate Laptop keeps a track of laptop's location whenever laptop gets connected to internet. What is lost is not just the laptop, but also the valuable, sensitive and creative data in it. It contains a smart agent, designed to collect and transmit critical data needed to pinpoint its location to identify the unauthorized user in case of a theft. It works in a stealth mode and can also silently inform you, about the location of your employee's laptop! Predefined settings allow the user to encrypt classified files and folders whenever laptop is not connected to internet for specified period or is detected stolen. It provides a secure web page for every user to monitor the Location, IP Address, and Internet Service Provider with date and time. It allow user to submit Theft Report online and provides regular Status Updates of laptop location on email. Laptop/ User Tracking Automated Data Encryption Tamper Proof Reporting Secure Webpage for every user to Keep (monitor) a close eye on movement of person with the designated laptop e.g. company employee. Remotely launch the data encryption module on predefined sensitive files and folders. Encrypts Data even if laptop is not connected to Internet for particular period. Reports on server contain information on date, time, Public IP. Location, country, state, city, ISP, Longitude & Latitude. No human intervention for reports. Crash Proof The Crash Proof / Data Leakage Prevention feature of Protegent complete security software creates the image of our systems data, Image of file. Crash Proof helps the user to keep the updated backup of data. This Software is designed to keep the image of the file indexes/ disk properties and it keeps updating them at regular intervals. In this business world, data volume have increased hence the computer dependency has also increased. As the dependency increases the downtime increases as well
due to data loss and the data lost cost us more than the recreation cost. Data Recovery cannot provide you the satisfactory results every time. Deleted file/ folder recovery Unformat formatted drives Repair Corrupted / Deleted Partition The software supports deleted file /folder recovery. It can recover the deleted/ lost files if they are deleted from your PC, even if they are not present in recycle bin. The software can even unformat the whole drive. With the help of this product the user can revive the file system from its replica, which is stored in some other location of the hard disk. With this software you can repair or build back the corrupted/ deleted partition, which may occur due to virus attacks or accidental deletion. Revive incase of FAT/MFT Corruption The software has a feature to build back your FAT/ MFT file system. It supports 100% recovery in case your file system gets corrupt. SysBoost The SysBoost feature of Protegent complete security software helps you to manage,maintain,optimize your computer system. SysBoost consist of six features which are Select and Wipe,Select Extensions,Defrag Drive,Internet Wipe,Registry Clean and Registry Restore.It improves the bootup time of the system by deleting junk registries,junk files and internet history.backup of unwanted files can be taken.by using this backup,files can be restored.sysboost analyses the system and brings out all the unwanted registries. Select and Wipe Select the files/folders you want to delete.selected files get deleted permanently. Backup and Wipe takes the backup of selected file, with this backup we can recover our deleted file. Select Extensions Deletes file with the mentioned extensions(txt,bmp,pdf etc) permanently. Backup and Wipe takes the backup of mentioned extensions, with this backup we can recover our deleted file.
Defrag Drive Internet Wipe In this feature Defragmentation of drive takes place. Increases the throughput of the system. Analyses the Drive and gives information weather the drive needs to be defragmented or not. Clears all the temporary internet files, internet cookies and internet history permanently. Registry Clean Scans the system and gives the accurate information of all the unwanted registries.software locations,shared DLLs,custom control,help files,startup items,deleted applications,most recently run list are the available categories of registries. Registry Restore Deletes unwanted registries can be restored by using this option. System Requirements You may install only on computers running the following operating systems: Windows XP (32-bit) Windows Vista with Service Pack 1 Windows 7 Windows 8 Before installation, make sure that your computer meets the minimum system requirements. Note: To find out the Windows operating system your computers is running and hardware information, right-click My Computer on the desktop and then select Properties from the menu. Minimum System Requirements 1.8 GB available free hard disk space (at least 800 MB on the system drive) 800 MHz processor 512 MB of memory (RAM)
Recommended System Requirements 2.8 GB available free hard disk space (at least 800 MB on the system drive) Intel CORE Duo (1.66 GHz) or equivalent processor Memory (RAM): o 512 MB for Windows XP o 1 GB for Windows Vista, Windows 7, Windows 8 Experience a brighter tomorrow..today