Network security features |
- Monitors network activity at the application and system component levels;
- Detects and blocks direct network intrusions;
- Detects and blocks network connections that malicious programs try to establish from within and outside the protected computer;
- Detects and blocks numerous types of attacks;
- Detects and blocks various dangerous active content on the Internet, such as JavaScript objects, ActiveX components, etc;
- Checks e-mail attachments for dangerous content, such as executable programs, JavaScript objects, ActiveX components, etc;
- Converts the protected computer into a "stealth" machine running invisibly to outside intruders;
- Provides detailed log information
|
|
Content control features |
- Detects and blocks unwanted information on the Internet, such as commercial banners, pop-up windows, and cookies;
- Blocks access to undesirable or inappropriate Web pages, specified either directly by their URLs, or by keywords;
|
Easy-to-use features |
- Automatic configuration during setup. Your computer is ready for surfing the Internet right after the installation;
- Presets for most Internet applications. No need to manually set ports, protocols, or other technical staff for each installed program;
- Multiple and easily switchable configurations that you can create for a specific network environment (for your home, for your office local network, or for a public Wi-Fi spot);
- Two types of interfaces: Simple for inexperienced users and Advanced for fine-tuning;
- An indefinite number of rules for each application;
- Low resource requirements
|
|