Features of Max Secure Internet Security 2012
Exciting,
Easy to understand GUI
Easy, Quick installation
Get immediate protection from emerging threats
1. Most Effective protection against Spyware, Malware, Adware, Key logger and Rootkit
2. Fast Scan Technology
3. Advanced Monitoring prompts warn you in case any program makes illegal entries in critical
registry locations.
USB and External Drive protection
1. Complete USB block for total safety from external devices
2. Uninterrupted external Drive scan and notification, automated removal of Malware. Also,
prevents Host PC from getting infected wit pen drives or pen drives from getting infected
from host pc so prevents spread of Malware infections.
3. Auto Run and Short-cut creation protection so minimize virus transmission to other PCs.
Advanced Emulation technology included to detect polymorphic viruses, packed files and
complex Malware.
1. Heuristic Scanning for zero Day Virus Detection
2. Easy Recovery of any quarantined file in case you need it
3. Real time Active Protection for Virus and Rootkit in memory
System File Protection: System File Protection to protect any infection to Windows
operating system files
Bootable Rescue CD available for safe mode scan , create yourself by downloading it from
our website
Submit suspicious samples: Submit sample allows you to manually submit suspicious
samples to our Lab for analysis using cloud technology
Submit Log : Manually, Logs can be submitted via Submit Log button for further analysis
by our Research Teamavailable for safe mode scan , create yourself by downloading it
from our website.
Centralized Updates and Monitoring for all the PCs from 1 PC in a network.
Multi language Support
Automatic Self Updating threat definition Database
Registration
1. Web, SMS and Off-line Registration and Activation of product
2. License for years or Days, as desired
3. Free 30 Day Demo
Two Way firewall: Prevent your Pc from network attacks and block any protocol, port
or applications on demand.
Gaming Mode: Run in this thin resource usage mode where you have the same protection
but your other applications get priority.
Easy, Quick installation
Get immediate protection from emerging threats
1. Most Effective protection against Spyware, Malware, Adware, Key logger and Rootkit
2. Fast Scan Technology
3. Advanced Monitoring prompts warn you in case any program makes illegal entries in critical
registry locations.
USB and External Drive protection
1. Complete USB block for total safety from external devices
2. Uninterrupted external Drive scan and notification, automated removal of Malware. Also,
prevents Host PC from getting infected wit pen drives or pen drives from getting infected
from host pc so prevents spread of Malware infections.
3. Auto Run and Short-cut creation protection so minimize virus transmission to other PCs.
Advanced Emulation technology included to detect polymorphic viruses, packed files and
complex Malware.
1. Heuristic Scanning for zero Day Virus Detection
2. Easy Recovery of any quarantined file in case you need it
3. Real time Active Protection for Virus and Rootkit in memory
System File Protection: System File Protection to protect any infection to Windows
operating system files
Bootable Rescue CD available for safe mode scan , create yourself by downloading it from
our website
Submit suspicious samples: Submit sample allows you to manually submit suspicious
samples to our Lab for analysis using cloud technology
Submit Log : Manually, Logs can be submitted via Submit Log button for further analysis
by our Research Teamavailable for safe mode scan , create yourself by downloading it
from our website.
Centralized Updates and Monitoring for all the PCs from 1 PC in a network.
Multi language Support
Automatic Self Updating threat definition Database
Registration
1. Web, SMS and Off-line Registration and Activation of product
2. License for years or Days, as desired
3. Free 30 Day Demo
Two Way firewall: Prevent your Pc from network attacks and block any protocol, port
or applications on demand.
Gaming Mode: Run in this thin resource usage mode where you have the same protection
but your other applications get priority.
Secure Online Banking and Shopping
Web
Security:
Prevents Bad websites from being browsed. In addition to malicious bad websites database provided by our lab, users can also add sites to this list and block any website they do not wish their kids or family to visit. Blocks any malicious websites making access to their remote server.
Email Security:
Scan all incoming and outgoing emails in outlook for viruses, Malware, Trojans. As well as for Phishing or Spamming attacks.
Anti Spam:
Block spam websites from being browsed o come in your mail box. Scans all Outlook emails and moves suspicious mails to the Anti spam folder for your review. Guards against unwanted spam.
Anti Phishing:
Protect your data from phishing attacks and use our defined phishing list and also add your own with ease. Prevent cybercriminals from stealing your digital identity.
Prevents Bad websites from being browsed. In addition to malicious bad websites database provided by our lab, users can also add sites to this list and block any website they do not wish their kids or family to visit. Blocks any malicious websites making access to their remote server.
Email Security:
Scan all incoming and outgoing emails in outlook for viruses, Malware, Trojans. As well as for Phishing or Spamming attacks.
Anti Spam:
Block spam websites from being browsed o come in your mail box. Scans all Outlook emails and moves suspicious mails to the Anti spam folder for your review. Guards against unwanted spam.
Anti Phishing:
Protect your data from phishing attacks and use our defined phishing list and also add your own with ease. Prevent cybercriminals from stealing your digital identity.
Support
Round
the clock, unlimited technical support from any where in the world
Free E mail, Live Chat and Remote Support to resolve any virus or product related issues
on customers PCs
Works on the following Platforms:
1. Windows® 2000 Professional SP4 KB891861
2. For all Windows versions of 32 bit and 64-bit
Windows® XP with SP1 and above
Windows® Vista Ultimate
Windows® Vista Home Premium
Windows® Vista Home Basic
Windows® Vista Business
Windows® Vista Enterprise
Windows® 7 Ultimate
Windows® 7 Home Premium
Windows® 7 Home Basic
Windows® 7 Business
Windows® 7 Enterprise
Your computer must have a minimum of 256 Megabytes(MB) of RAM
(recommended 512 MB), 500 MB of free hard disk space, and a CD-ROM or USB drive
or Internet for the availability of Set up file.
Free E mail, Live Chat and Remote Support to resolve any virus or product related issues
on customers PCs
Works on the following Platforms:
1. Windows® 2000 Professional SP4 KB891861
2. For all Windows versions of 32 bit and 64-bit
Windows® XP with SP1 and above
Windows® Vista Ultimate
Windows® Vista Home Premium
Windows® Vista Home Basic
Windows® Vista Business
Windows® Vista Enterprise
Windows® 7 Ultimate
Windows® 7 Home Premium
Windows® 7 Home Basic
Windows® 7 Business
Windows® 7 Enterprise
Your computer must have a minimum of 256 Megabytes(MB) of RAM
(recommended 512 MB), 500 MB of free hard disk space, and a CD-ROM or USB drive
or Internet for the availability of Set up file.
What is Firewall?
Firewall is a piece of software or
hardware that helps screen out hackers, viruses, and worms that try to reach
your computer over the Internet. If you are a home user or a business user,
using a firewall is the most effective and important first step you can take to
help protect your computer.
Max Secure Firewall provides a robust way to effectively filter network traffic, prevent malicious behavior, protect running processes and filter web content. It provides filtering of I/O requests at the kernel and user levels. Max Secure Firewall is one of the best defenses against malicious software attacks on your system.
1. Network Filter:
The firewall keeps track of all communications that have originated from your computer, and it prevents unsolicited traffic from reaching your computer. The two-way firewall monitors your computer’s inbound and outbound connections and prevents local and remote unauthorized network access. You can specify if you wish to block communication from a range of network addresses or protocols.
A set of rules are provided for specific well-known protocols. This is provided for convenience so that user don’t have to have deep protocol knowledge to configure them.
2. Application Rules:
This is a set of rules that manage how certain applications will access the network. These rules are based only on the application path; they don’t configure any port/protocol. They can allow all communications coming to/going from the application. You can add any application by clicking on Add button and specify rule such as allow or block. Blocked application will not be allowed to be executed on this PC. A firewall will help protect a computer on a wireless network, but will not restrict access to the network itself. You security on wireless network, you should configure your wireless network to use a network key using either Wi-Fi Protected Access (WPA) or wired equivalent privacy (WEP). For more information, consult the manual for your wireless networking devices.
3. Internet Filter:
Anti Phishing, Anti banner and Bad Website blocking : This feature protects the incoming web traffic and prevents denagerous scripts and urls from being browsed on your PC. You can also add your urls by domain name or any sub-string if you want.
Anti-Banner: blocks advertising information located on banners, built into interfaces of various programs installed on your computer, or displayed online, mostly in browsers. Not only are banner ads devoid of useful information but they also distract you from your work and increase the amount of traffic on your computer.
Anti-Phishing: protects you from phishing. Phishing generally consists of e-mails from fake financial institutions that contain links to their websites which look alike some genuine bank or financial institution. . The message text convinces the reader to click the link and enter confidential information in the window that follows, for example, a credit card number or a login and password or an Internet banking site where financial operations can be carried out.
Bad Website blocking: The module is designed to provide safe Internet surfing by restricting access to unsecure web resources, websites which have been considered as suspicious or phishing.
4. Email Scan: Scans all incoming and outgoing messages and their attachements. Pop3, SMTP, IMAP, MAPI and NNTP protocols are supported.
Max Secure Firewall provides a robust way to effectively filter network traffic, prevent malicious behavior, protect running processes and filter web content. It provides filtering of I/O requests at the kernel and user levels. Max Secure Firewall is one of the best defenses against malicious software attacks on your system.
1. Network Filter:
The firewall keeps track of all communications that have originated from your computer, and it prevents unsolicited traffic from reaching your computer. The two-way firewall monitors your computer’s inbound and outbound connections and prevents local and remote unauthorized network access. You can specify if you wish to block communication from a range of network addresses or protocols.
A set of rules are provided for specific well-known protocols. This is provided for convenience so that user don’t have to have deep protocol knowledge to configure them.
2. Application Rules:
This is a set of rules that manage how certain applications will access the network. These rules are based only on the application path; they don’t configure any port/protocol. They can allow all communications coming to/going from the application. You can add any application by clicking on Add button and specify rule such as allow or block. Blocked application will not be allowed to be executed on this PC. A firewall will help protect a computer on a wireless network, but will not restrict access to the network itself. You security on wireless network, you should configure your wireless network to use a network key using either Wi-Fi Protected Access (WPA) or wired equivalent privacy (WEP). For more information, consult the manual for your wireless networking devices.
3. Internet Filter:
Anti Phishing, Anti banner and Bad Website blocking : This feature protects the incoming web traffic and prevents denagerous scripts and urls from being browsed on your PC. You can also add your urls by domain name or any sub-string if you want.
Anti-Banner: blocks advertising information located on banners, built into interfaces of various programs installed on your computer, or displayed online, mostly in browsers. Not only are banner ads devoid of useful information but they also distract you from your work and increase the amount of traffic on your computer.
Anti-Phishing: protects you from phishing. Phishing generally consists of e-mails from fake financial institutions that contain links to their websites which look alike some genuine bank or financial institution. . The message text convinces the reader to click the link and enter confidential information in the window that follows, for example, a credit card number or a login and password or an Internet banking site where financial operations can be carried out.
Bad Website blocking: The module is designed to provide safe Internet surfing by restricting access to unsecure web resources, websites which have been considered as suspicious or phishing.
4. Email Scan: Scans all incoming and outgoing messages and their attachements. Pop3, SMTP, IMAP, MAPI and NNTP protocols are supported.
Protect - Confidential information, files & documents | ||
Prevent - Data and identity theft | ||
Preserve – Network bandwidth for faster access & productivity | ||
Personalize- Scans to remove only the items you select | ||
Proven – To create a faster virus and spyware free network | ||
|
|
|
|
|
No comments:
Post a Comment