Bitdefender Client Security, GOV, 1Y, 1000+ u CL3680100G 数据表

产品代码
CL3680100G
下载
页码 2
CLIENT SECURITY
Award winning virus detection, cleaning
and quarantine of viruses, spyware/
adware, Trojans and rootkits
Allows flexible scheduling of on-demand
or immediate execution scans for up-to-
date infection assessments
Optimized scanning using file
fingerprinting for each user session and
re-scans them upon new session creation,
an update, or on infection of the system
Quarantine’s infected or suspected files
for to minimize infections and later safe
analysis
Policy-based configuration and
management
Personal firewall protection for remote
and roaming users
System level spam protection with
constantly updated whitelists/blacklists
and Bayesian learning engine to identify
new spam that bypass traditional filters
Customizable content filtering to identify
sensitive information to minimize data
leakage
Reduce resource costs and overhead of
managing multiple clients using a central
management console.
Allows remote configuration, auditing,
installation, and application removal
from any client or server system in the
network
THE FOUNDATION OF BUSINESS SECURITY
The security requirements for any new or existing company – no matter how large or small 
- should be the same. While protecting your company’s intellectual property and securing 
customer data are good business practices, the impact of any virus outbreak greatly affects 
the company’s operational efficiency and can incur lost productivity from the workforce.  This 
loss of productivity can cripple a small company and at best, hamper the company’s growth.
ANTIVIRUS IS NOT ENOUGH
Threats are constantly evolving to circumvent the security controls your organization puts 
in place. While antivirus is the foundation of a good security policy, it is no longer the only 
answer to protecting your workforce from malicious threats. Threats that cause significant 
business disruption can include:
Viruses:  Transmitted by infecting executable files, hidden inside of compressed 
archives or as macros within legitimate documents. Virus payloads include deleting 
files, encrypting data, wiping the hard disk, etc. 
 Adware/Spyware: Almost as disruptive and dangerous as a virus, spyware can be 
difficult to identify and hard to remove. Personal and corporate data leakage is a key 
concern, in addition to deteriorating workstation performance, installing additional 
software and redirecting browser activity. Badly infected systems may require a 
complete system reinstall, wasting hours of IT time and resources.
Worms:  A self replicating program that uses the network to propagate, slowing 
down networks and infecting systems by leveraging system and application 
vulnerabilities. Payloads can include the deletion or encryption of files, emailing out 
documents, installing backdoors, zombies and Trojans. 
Trojans and Root Kits: Trojans and Root Kits appear to be legitimate programs but 
are designed to allow remote access to a computer system. Once a Trojan or Root 
Kit has been installed, it is possible for an attacker to access the system remotely 
and often can leads to data theft. Detecting and preventing these types of threats 
manually can be time consuming and often lead to a complete system reinstall if 
improperly removed.
Email Spam and Phishing: Unsolicited commercial advertisements distributed via 
email are more than just an annoyance.  Spam consumes too much of peoples’ 
personal time if not managed properly. Some Spam or phishing attacks may also 
include malware as attachments - leading to internal compromise if executed – or 
links to websites requesting personal information. Phishing uses similar techniques 
but directs the user to a seemingly legitimate website in order to harvest personal 
information, such as credit card or bank account information or dropping keyloggers 
onto the system that can harvest sensitive company information. 
The impact of malware can be a severe disruption to everyone in the organization - however, 
it is the IT department that feels the after-effects the most. IT administrators that have dealt 
with the removal of a quickly propagating worm or virus that has infected a large number 
of systems knows that it is a long, time consuming task. Unfortunately, that task must take 
precedence over other IT projects to limit data loss and restore workforce efficiency as quickly 
as possible. 
SECURING YOUR ENDPOINTS WITH BITDEFENDER 
The answer to data loss and lost productivity from malware is proactive protection.  Companies 
can effectively protect their endpoints from attack by using BitDefender‘s ability to detect and 
prevent known and zero-day threats, ensure compliance to corporate security policies and 
manage them effectively with fewer IT resources.
www.bitdefender.com
KEY FEATURES 
AND BENEFITS
 
®
DATA SHEET