Information base

  • Basic and heuristic protection in real time – there is no need to manually scan each file for maliciousness
  • Protection and optimization of the system registry in real time
  • Protection from potentially unwanted programs from the Internet
  • Protection of USB/CD/DVD removable media from infection by autorun-malware
  • Easy and insensible work of the program (“installed and forgotten”)
  • Optimizing your computer’s hard drive
  • Dual-core data protection system (Basic Engine and “Ano” protection)
  • Unique technology “Ano” protection for detecting even unknown viruses
  • Internet Connection Protection
  • Protection against phishing, fraudulent and malicious web resources
  • HIPS (behavioral) analyzer
  • A powerful firewall for preventing intrusions from outside
  • Presence of antispyware/virtual keyboard
  • Ability to use on servers and in corporations
  • Centralized management capability
  • A large number of useful security utilities
  • Possibility to work with Proxy-server
  • Protection against spoofing system files
  • Protection against malicious libraries and drivers
  • Integrated system startup protection
  • Built-in registry monitor, the main task of which is to monitor changes in critical records and the main system registry
  • A “collective intelligence” system – Cloud Protection, based on cloud data security methods
  • Daily update of virus signatures
  • Support for all popular operating systems of the Windows NT family
  • Protection against DoS and DDoS attacks in real time
  • Built-in anti-skype (AntiKeylogger)
  • Clearing temporary (“garbage”) OS files
  • Availability of quality self-protection from unloading by third-party processes
  • Quarantine control with the ability to restore objects from the storage
  • Password protection of product settings
  • Logging for user convenience
  • Flash vaccination – “vaccination” from the most common USB worms
  • The technology of accelerated scanning of files only on their title
  • Presence of own development – “file auditor”
  • Preventing IP loggers and other unwanted websites from visiting
  • Parental control with fine settings
  • The ability to change the interface of the control center
  • Presence of “game mode” without notifications (the antivirus will independently make the best decision regarding the threat)
  • File control parameters with the addition of exceptions (including the ability to add media literals to check exclusions)
  • Configuring a Default Threat Policy
  • The module for personal protection of important files (enhanced protection against Trojans of the Crypto class)
  • The ability to control the sound effects in the notification (including the complete deactivation of musical accompaniment)
  • The presence of a center for managing anti-ransomware reports in the process of work
  • Secondary firewall “Pluton” (works by default)
  • Protect all network protocols (including Wi-Fi)
  • Daily engine and program module updates
  • Ability to upgrade from a local server/other storage media
  • Updating of anti-virus signatures/versions of the program without access to the Internet
  • Secure data entry from a regular keyboard (Anti-Spyware)
  • Protection from modification of system files and other critical objects
  • Prevent the installation of malicious drivers
  • Ability to upgrade to the new version of the program without reinstalling
  • Simple and intuitive interface

System requirements:

Microsoft Windows Whistler, Windows XP (SP1 and higher), Microsoft Longhorn, Windows Vista, Windows 7 (Seven), Windows 8, Windows 8.1, Windows 10, Windows Server Standard/Enterprise 2003 (from SP2), Windows Server Standard/Enterprise 2008 R2, Windows Small Business Server (Essentials/Standard) 2011, Windows MultiPoint Server 2011, Windows Standard R2/Foundation Windows Server 2012, Windows Server 2003 Essentials/Standard (x32/x64 bit)

Processor: from 800 Mhz and higher

Memory: from 512 Mb RAM

Hard disk space: from 1 GB

Additional requirements: Microsoft Internet Explorer 8 and higher.

For more information, please contact [email protected]

Top