vendredi 26 novembre 2010

Sécurisez votre entreprise avec des logiciels GRATUITS-FIABLES

Comodo Internet Security :
Comodo Internet Security is the free, multi-layered security application that keeps hackers out and personal information in.

Built from the ground upwards with your security in mind, Internet Security offers 360° protection by combining powerful Antivirus protection, an enterprise class packet filtering firewall, advanced host intrusion prevention and automatic sandboxing of unknown files.

Unlike the stripped down versions of commercial software that other software vendors offer for free, this is the full, completely functional version of the product.

Users can upgrade to Comodo Internet Security Pro 2011 for just $49.99 per year and receive two additional services—GeekBuddy—a 24 hour per day, unlimited incident support services package which usually markets for $49.99 per year and TrustConnect - a secure Internet proxy service that ensures 128 bit encrypted connectivity from any public wireless hot-spot.
Internet Security Includes:

* Antivirus: Tracks down and destroy any existing malware hiding in a PC.
* Anti-Spyware: Detects spyware threats and destroys each infection.
* Anti-Rootkit: Scans, detects & removes rootkits on your computer.
* Bot Protection: Prevents malicious software turning your PC into a zombie.
* Defense+: Protects critical system files and blocks malware before it installs.
* Auto Sandbox Technology™: Runs unknown files in an isolated environment where they can cause no damage.
* Memory Firewall: Cutting-edge protection against sophisticated buffer overflow attacks.
* Anti-Malware Kills malicious processes before they can do harm.
What makes Internet Security different?

Default Deny Protection™ (DDP)
Known and listed PC-safe files and applications are easily idenfied and able to access your PC.
Prevention-based protection
Firewall and Antivirus combine to stop viruses and malware before they enter the PC.
Auto Sandbox Technology™
The sandbox is a virtual operating environment for untrusted programs – ensuring viruses and other malicious software are completely isolated from the rest of your computer.
Personalized protection alerts
Firewall quickly learns the rules you set for downloading software, and adjusts its alerts accordingly to fit your needs.
Spyware Scanning
Spyware Scanner detects and cleans malware infections in PC registry and disks.
Cloud based Antivirus
Cloud based antivirus scanning detects malicious file even if a user does not have up-to-date virus definitions.
Cloud based Behavior Analysis
Cloud based behavior analysis system detects zero-day malware INSTANTLY.
Cloud based Whitelisting
Cloud based whitelisting of trusted publisher easily identifies a safe file and vendor
Malicious website filtering
Our SecureDNS service helps keep you safe online by consulting a real-time blacklist of dangerous websites and warning you if you attempt to connect to one (must be enabled during installation)
Game Mode
Suppresses operations that could interfere with a user’s gaming experience such as alerts, virus database updates or scheduled scans.
Application Control
Provides users with the ability to lockdown their PC so only known good applications can run.
One-click virus scanning
Make sure your PC is clean with one simple button click.
Uncluttered, user-friendly interface
Quickly navigate through the various parts of Firewall protection without getting lost.
Thorough security "wizards"
Preset security settings for simple point-and-click setup.
Unique "slider" to easily change your current security level
Easily switch between presets to reflect your security preference at any given time.
Exclusive access to Comodo's "safe-list"
List of over two million known PC-friendly files and applications so safe files and apps are allowed to run.
60 Days of FREE GeekBuddy live remote PC support
After installing your Comodo product, just click the GeekBuddy icon to have your Geek remotely fix virtually any PC issue you face, including Computer Troubleshooting, Printer & Email Setup, Software Installs, ID Protection Settings, and Live Virus & Spyware Removal
Comodo Cloud Scanner :
Comodo Cloud Scanner (CCS) is an easy to use tool that quickly and accurately identifies malware, viruses, suspicious processes and other problems with your computer. It harnesses all the scanning power of Comodo Internet Security and Comodo System-Cleaner and packages them inside a lightweight and sleek desktop interface. What's more, instead of using your computers processing power to run a scan, CCS connects to Comodo's powerful online servers and gets them to do all the hard work instead. Put simply, there's never been an easier or more accurate way to diagnose potential problems on your PC.
Comodo Cloud Scanner 2.0 Features

New Features

* Deeper scan in special folders (Windows and Program Files) for malware, from Malware & Suspicious section.
* Custom Scan. Just by right clicking on your directories or process files, Windows Shell starts scanning for malware and suspicious files.

Improvements

* Cloud scanning. Using our latest cloud technology to scan your computer with Comodo online services and tools. Cloud Scanner makes a real-time connection to Comodo's online database and it detects the very latest malware.
* Hidden processes detection. Our tool detects processes that are hidden and could be dangerous to your system.
* Fastest scanning engine. We use one of the fastest scanning engine, 30% faster than the previous one.
* Detect junk files. Over time your disk becomes occupied by temporary internet files, unused icons and duplicate files.

Benefits

* Our experts will solve it. Our experts will solve all the detected problems on your computer without you doing a thing.
What's New

* Files verification before submitted via CIMA. The files already submited have quicker verdicts.
* Files Checking FLS vs. CIMA. Either behind a proxy or in case of connection problems with one of our servers, now you can be sure that the other one will give you diagnostics.

What's Fixed

* CCS not detecting modified files with hex editor.
* Issue detecting files when working via proxy.
* Problem with CIMA analysis (files already submitted to COMODO servers).

Improvements

* Cloud scanning. Using our latest cloud technology to scan your computer with Comodo online services and tools. Cloud Scanner makes a real-time connection to Comodo's online database and it detects the very latest malware.
* Hidden processes detection. Our tool detects processes that are hidden and could be dangerous to your system.
* Fastest scanning engine. We use one of the fastest scanning engine, 30% faster than the previous one.
* Detect junk files. Over time your disk becomes occupied by temporary internet files, unused icons and duplicate files. They can have a negative impact on the performance of your computer. They can be called junk files and are detected by Cloud Scanner.
* Deeper scan in special folders (Windows and Program Files) for malware, from Malware & Suspicious section.
* Custom Scan. Just by right clicking on your directories or process files, Windows Shell starts scanning for malware and suspicious files.

Benefits

* Malware detection. Using our cloud technology you will be able to detect resident malware on your system.
* Reveal leftover files & registry. Our latest scan engine has a fast detection of unneeded files and registries that ocupies your disk.
* Detect privacy issues. Use our tool to detect privacy data files from all the applications on your computer. You can protect yourself by revealing sensitive files, like history, passwords, bookmars, etc.
* Our experts will solve it. Our experts will solve all the detected problems on your computer without you doing a thing.
Comodo Disk Encryption :
Our Disk Encryption software protects sensitive information by enabling encryption of any drive on the system. "Encryption" is the process of scrambling data using a kind of code known only to the software doing the coding, so that anyone accessing the private data is unable to read it. Disk Encryption works on the fly, so there's no need to shut down or reboot the PC to encrypt private data. Disk Encryption offers several different methods of accessing the encrypted data to suit your own personal security needs.
Different Methods of Authentication

* Set a password of your choice that must be entered whenever you want to access the encrypted data
* USB Disk Authentication - Configure a USB device to act as a "key" to view encrypted information (it must be plugged into the system for access).
* For the highest level of security, choose to only allow access to the data when both a USB and password are present.

Finding a total method to store sensitive data and provide complete data security has always been a complex problem. With mobile and desktop computers acting as storage devices for sensitive information, data loss and data theft are on the rise. Attempting to maintain encrypted files on removable media is not a reliable option as these can be forgotten, stolen or lost. Finally, the solution is here: Free Disk Encryption Software from Comodo.
* Keep data totally protected from hackers, thieves, and all unauthorized viewing
* You don't want private data to be accessed when you're away from your computer
* If your desktop or laptop is stolen, the thieves will not have access to personal data
* Share your computer with other people knowing that they can't view your personal files
* To be the only person that is able to start a specific computer
For more infos about companies that work in this field, please go to :

Aucun commentaire:

Enregistrer un commentaire