Curb outbreak damage
Limit outbreak damage, even before DAT files are issued; close ports, monitor applications and email engines, block files and directories, and trace and block infection sources
· Scans memory for malicious code
Detect threats that write to memory rather than disk, such as CodeRed and SQLSlammer
· Protect email programs
Detect and scour viruses in Microsoft Outlook and Lotus Notes-including HTML text and attachments
· Keep script-type threats at bay
Prevent threats that exploit JavaScript or Visual Basic from executing
· Optimize updating for remote systems
Tailor field updates to physical locations and connection speeds: resume updating after a broken connection is re-established
· Lock down files
Keep VirusScan Enterprise files from being altered with enhanced access protection rules
· Advanced rootkit detection
Scan system memory for installed rootkits, hidden processes, and other concealed malicious code
Requirements:
Workstation requirements
· Intel Pentium or Intel Celeron processor running a minimum of 166 MHz
· 32 MB of RAM
· Minimum 38 MB free disk space
· Microsoft Internet Explorer 5.0 or higher
Server requirements:
· Intel Pentium or Intel Celeron processor running a minimum of 166 MHz
· 32 MB of RAM
· Minimum 38 MB free disk space
· Microsoft Internet Explorer 5.0 or higher
Limit outbreak damage, even before DAT files are issued; close ports, monitor applications and email engines, block files and directories, and trace and block infection sources
· Scans memory for malicious code
Detect threats that write to memory rather than disk, such as CodeRed and SQLSlammer
· Protect email programs
Detect and scour viruses in Microsoft Outlook and Lotus Notes-including HTML text and attachments
· Keep script-type threats at bay
Prevent threats that exploit JavaScript or Visual Basic from executing
· Optimize updating for remote systems
Tailor field updates to physical locations and connection speeds: resume updating after a broken connection is re-established
· Lock down files
Keep VirusScan Enterprise files from being altered with enhanced access protection rules
· Advanced rootkit detection
Scan system memory for installed rootkits, hidden processes, and other concealed malicious code
Requirements:
Workstation requirements
· Intel Pentium or Intel Celeron processor running a minimum of 166 MHz
· 32 MB of RAM
· Minimum 38 MB free disk space
· Microsoft Internet Explorer 5.0 or higher
Server requirements:
· Intel Pentium or Intel Celeron processor running a minimum of 166 MHz
· 32 MB of RAM
· Minimum 38 MB free disk space
· Microsoft Internet Explorer 5.0 or higher
0 comments:
Post a Comment