Bitdefender Client Security, GOV, 1Y, 1000+ u CL3680100G 数据表
产品代码
CL3680100G
CLIENT SECURITY
•
Award winning virus detection, cleaning
and quarantine of viruses, spyware/
adware, Trojans and rootkits
and quarantine of viruses, spyware/
adware, Trojans and rootkits
•
Allows flexible scheduling of on-demand
or immediate execution scans for up-to-
date infection assessments
or immediate execution scans for up-to-
date infection assessments
•
Optimized scanning using file
fingerprinting for each user session and
re-scans them upon new session creation,
an update, or on infection of the system
fingerprinting for each user session and
re-scans them upon new session creation,
an update, or on infection of the system
•
Quarantine’s infected or suspected files
for to minimize infections and later safe
analysis
for to minimize infections and later safe
analysis
•
Policy-based configuration and
management
management
•
Personal firewall protection for remote
and roaming users
and roaming users
•
System level spam protection with
constantly updated whitelists/blacklists
and Bayesian learning engine to identify
new spam that bypass traditional filters
constantly updated whitelists/blacklists
and Bayesian learning engine to identify
new spam that bypass traditional filters
•
Customizable content filtering to identify
sensitive information to minimize data
leakage
sensitive information to minimize data
leakage
•
Reduce resource costs and overhead of
managing multiple clients using a central
management console.
managing multiple clients using a central
management console.
•
Allows remote configuration, auditing,
installation, and application removal
from any client or server system in the
network
installation, and application removal
from any client or server system in the
network
THE FOUNDATION OF BUSINESS SECURITY
The security requirements for any new or existing company – no matter how large or small
- should be the same. While protecting your company’s intellectual property and securing
customer data are good business practices, the impact of any virus outbreak greatly affects
the company’s operational efficiency and can incur lost productivity from the workforce. This
loss of productivity can cripple a small company and at best, hamper the company’s growth.
ANTIVIRUS IS NOT ENOUGH
Threats are constantly evolving to circumvent the security controls your organization puts
in place. While antivirus is the foundation of a good security policy, it is no longer the only
answer to protecting your workforce from malicious threats. Threats that cause significant
business disruption can include:
Viruses: Transmitted by infecting executable files, hidden inside of compressed
archives or as macros within legitimate documents. Virus payloads include deleting
files, encrypting data, wiping the hard disk, etc.
Adware/Spyware: Almost as disruptive and dangerous as a virus, spyware can be
difficult to identify and hard to remove. Personal and corporate data leakage is a key
concern, in addition to deteriorating workstation performance, installing additional
software and redirecting browser activity. Badly infected systems may require a
complete system reinstall, wasting hours of IT time and resources.
Worms: A self replicating program that uses the network to propagate, slowing
down networks and infecting systems by leveraging system and application
vulnerabilities. Payloads can include the deletion or encryption of files, emailing out
documents, installing backdoors, zombies and Trojans.
Trojans and Root Kits: Trojans and Root Kits appear to be legitimate programs but
are designed to allow remote access to a computer system. Once a Trojan or Root
Kit has been installed, it is possible for an attacker to access the system remotely
and often can leads to data theft. Detecting and preventing these types of threats
manually can be time consuming and often lead to a complete system reinstall if
improperly removed.
Email Spam and Phishing: Unsolicited commercial advertisements distributed via
email are more than just an annoyance. Spam consumes too much of peoples’
personal time if not managed properly. Some Spam or phishing attacks may also
include malware as attachments - leading to internal compromise if executed – or
links to websites requesting personal information. Phishing uses similar techniques
but directs the user to a seemingly legitimate website in order to harvest personal
information, such as credit card or bank account information or dropping keyloggers
onto the system that can harvest sensitive company information.
The impact of malware can be a severe disruption to everyone in the organization - however,
it is the IT department that feels the after-effects the most. IT administrators that have dealt
with the removal of a quickly propagating worm or virus that has infected a large number
of systems knows that it is a long, time consuming task. Unfortunately, that task must take
precedence over other IT projects to limit data loss and restore workforce efficiency as quickly
as possible.
SECURING YOUR ENDPOINTS WITH BITDEFENDER
The answer to data loss and lost productivity from malware is proactive protection. Companies
can effectively protect their endpoints from attack by using BitDefender‘s ability to detect and
prevent known and zero-day threats, ensure compliance to corporate security policies and
manage them effectively with fewer IT resources.
www.bitdefender.com
KEY FEATURES
AND BENEFITS
®
DATA SHEET