Bitdefender Client Security, 50-99u, 3Y, GOV, Cross, DEU CL5680300C Hoja De Datos
Los códigos de productos
CL5680300C
IT’S YOUR BUSINESS. DEFEND IT.
CLIENT SECURITY DATASHEET
BITDEFENDER
CLIENT
SECURITY
THE FOUNDATION OF BUSINESS SECURITY
The security requirements for any new or existing company – no matter how large or
small - should be the same. While protecting your company’s intellectual property and
securing customer data are good business practices, the impact of any virus outbreak
greatly affects the company’s operational effi ciency and can incur lost productivity
from the workforce. This loss of productivity can cripple a small company and at best,
hamper the company’s growth.
ANTIVIRUS IS NOT ENOUGH
Threats are constantly evolving to circumvent the security controls your organization
puts in place. While antivirus is the foundation of a good security policy, it is no longer
the only answer to protecting your workforce from malicious threats. Threats that cause
signifi cant business disruption can include:
Viruses: Transmitted by infecting executable fi les, hidden inside of
compressed archives or as macros within legitimate documents. Virus
payloads include deleting fi les, encrypting data, wiping the hard disk, etc.
Adware/Spyware: Almost as disruptive and dangerous as a virus, spyware
Adware/Spyware: Almost as disruptive and dangerous as a virus, spyware
can be diffi cult to identify and hard to remove. Personal and corporate data
leakage is a key concern, in addition to deteriorating workstation
performance, installing additional software and redirecting browser activity.
Badly infected systems may require a complete system reinstall, wasting
hours of IT time and resources.
Worms: A self replicating program that uses the network to propagate,
Worms: A self replicating program that uses the network to propagate,
slowing down networks and infecting systems by leveraging system and
application vulnerabilities. Payloads can include the deletion or encryption of
fi les, emailing out documents, installing backdoors, zombies and Trojans.
Trojans and Root Kits: Trojans and Root Kits appear to be legitimate
Trojans and Root Kits: Trojans and Root Kits appear to be legitimate
programs but are designed to allow remote access to a computer system.
Once a Trojan or Root Kit has been installed, it is possible for an attacker to
access the system remotely and often can leads to data theft. Detecting and
preventing these types of threats manually can be time consuming and often
lead to a complete system reinstall if improperly removed.
Email Spam and Phishing: Unsolicited commercial advertisements
Email Spam and Phishing: Unsolicited commercial advertisements
distributed via email are more than just an annoyance. Spam consumes too
much of peoples’ personal time if not managed properly. Some Spam or
phishing attacks may also include malware as attachments - leading to
internal compromise if executed – or links to websites requesting personal
information. Phishing uses similar techniques but directs the user to a
seemingly legitimate website in order to harvest personal information, such
as credit card or bank account information or dropping keyloggers onto the
system that can harvest sensitive company information.
The impact of malware can be a severe disruption to everyone in the organization -
however, it is the IT department that feels the after-effects the most. IT administrators
that have dealt with the removal of a quickly propagating worm or virus that has
infected a large number of systems knows that it is a long, time consuming task.
Unfortunately, that task must take precedence over other IT projects to limit data loss
and restore workforce effi ciency as quickly as possible.
KEY FEATURES AND BENEFITS
●
Award winning virus detection,
cleaning and quarantine of viruses,
spyware/adware, Trojans
and rootkits
●
Allows fl exible scheduling of on-
demand or immediate execution
scans for up-to-date
infection assessments
●
Optimized scanning using fi le
fi ngerprinting for each user session
and re-scans them upon new
session creation, an update, or on
infection of the system
●
Quarantine’s infected or suspected
fi les for to minimize infections and
later safe analysis
●
Policy-based confi guration
and management
●
Personal fi rewall protection for
remote and roaming users
●
System level spam protection with
constantly updated whitelists/
blacklists and Bayesian learning
engine to identify new spam that
bypass traditional fi lters
●
Customizable content fi ltering to
identify sensitive information to
minimize data leakage
●
Reduce resource costs and
overhead of managing multiple
clients using a central
management console.
●
Allows remote confi guration,
auditing, installation, and application
removal from any client or server
system in the network