+7 (495) 967-14-51 

 Contacts   Sitemap  
Language:  Russian English     Search: 
 
Main page  →  Company  →  News & Events  →  2018
About Us
Awards
Contacts
News & Events
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
Press Center

News

RSS

 

SoftControl Update: A convenient and reliable way to protect your computer from malware


The complexity of targeted attacks have not changed in the last two decades. An attack is always a well-planned, professional operation. Although the attack techniques and methods can be fine-tuned, most damage always comes from the use of conventional intrusion and cracking tools. This means malware that tends to get into the enterprise infrastructure by any means.


Experience has shown that


  • multilevel protection methods that the industry associations recommend and that the regulators require are effective;
  • designing, implementing and maintaining complex protection methods is very resource-intensive and is often hard to achieve. The problem is the lack of high-skilled and efficient staff.

A malware protection solution requires tools that enable users to:


  • get a clear idea about the information processing technologies in use; start from the ĎLearn your technologiesí principle.
  • design, test and iteratively improve the protection methods.
  • learn the technology quickly. The tools should be a means to train the personnel by solving real-world problems.


SoftControl 4.4. What's new?


New features in SoftControl 4.4 were developed in collaboration with our customersí engineers. The basis of these features is the generated best practices in implementing multilevel protection methods for sensitive infrastructure:



Detailed activity control rules




The users can create detailed activity control rules for groups of applications and certain processes from the control computer and distribute the created settings as specific or group policies. This allows specifying strict scenarios for the processing of the information under protection on a network of varied devices, as well as preventing system processes and dedicated software from being compromised.



Advanced audit mode




Advanced audit mode allows the users to test the control policy settings without any impact on the system under protection, which is very important when implementing multilevel protection methods on a sensitive infrastructure that is difficult to simulate on a test bench.



Examining the event log




Examining the event log from the administrator console is very convenient. The log provides detailed information about the activity of the applications on the system under protection and allows assessing possible impact of the protection methods under test.


Also the new version eliminated known vulnerabilities and defects, increased stability on multiprocessor computers.


You can update to the current version right now, it is available on the update server.

 

June 25, 2018


All news  |  Print this page


April 26, 2018 

July 09, 2018 


 

Computer security: Information security solutions | Host Intrusion Prevention System (HIPS) | Endpoint protection | The best virus protection | Whitelisting | Application Integrity Control | Comprehensive Malware Protection | Application protection | Windows Startup / Registry Protection | Online banking security | Online payment protection | Data leakage prevention (DLP) | Information security in medicine
2009-2018, SafeíNíSec Corporation. Privacy policy