Three protection technologies against new and unknown threats: 1) Hourly automated database updates, 2) Preliminary behavior analysis, 3) On-going behavior analysis. New!
Protection from viruses, Trojans and worms
Protection from spyware and adware
Real-time scanning for email, Internet traffic and files
Protection from viruses when using ICQ and other IM clients
Protection from all types of keyloggers. Improved!
Detection of all types of rootkits. Improved!
Automatic database updates