+7 (495) 967-14-51 

 Contacts   Sitemap  
Language:  Russian English     Search: 
 
Main page  →  Support  →  Useful information
Technical Support
Submit Support Request
Useful information
Host Intrusion Prevention System (HIPS)
Whitelisting
Application Integrity Control
Application protection
Windows Startup / Registry Protection
Online banking security

News

RSS

 


Useful information

  • Host Intrusion Prevention System (HIPS). Host Intrusion Prevention System monitors a single host for suspicious activity by analyzing events occurring within that host. HIPS solutions protect the host from the network layer all the way up to the application layer against known and unknown malicious attacks. In case of attempted operating system or application changes by a hacker or malware, HIPS blocks the action and alerts the user so an appropriate decision on next steps can be made.

  • Whitelisting. Application whitelisting is the complete opposite to the blacklisting approach used in traditional anti-viruses. Traditional anti-viruses use signature databases, which can be considered as a blacklist of program code not wanted on a machine. If the application contains code included in anti-virus signature base, this application will be blacklisted, and the anti-virus will consider it as malicious application and block it. Traditional anti-virus lets everything run except applications it knows are bad. As the number of new malicious programs increases exponentially, the signature blacklists cant be updated quickly enough, so new malicious applications are able to run.

  • Application Integrity Control. A critical part of any IT system is that applications perform correctly, that is to say, with integrity. Sometimes, application integrity can be accidentally broken: executable files or libraries may be changed or deleted, which will cause the application to be unstable.

  • Application protection. Applications control access to information stored locally or remotely - from credit card account details and email addresses to personal data, health records, and customer information. So, to achieve effective data security, you need application protection.

  • Windows Startup / Registry Protection. Without Windows registry protection, your PC is extremely vulnerable - if malware is able to tamper with the system registry, the computer will not function correctly. The Windows Registry is a hierarchical database that stores configuration settings and options used by the operating system - hardware preferences, where programs are stored, listings of all your Start-menu shortcuts, pointers to the programs that start up when you click on a desktop icon, and what programs are allowed to be start up at the same time as Windows. Registry protection is essential for the normal operation of your PC.

  • Online banking security. The standard method for obtaining online banking credentials is social engineering or phishing, often in conjunction with a Banking Trojan. Two of most widespread such targeted malware programs are Zeus and SpyEye, which together have compromised millions of computers since they first appeared.


Print this page

 

Computer security: Information security solutions | Host Intrusion Prevention System (HIPS) | Endpoint protection | The best virus protection | Whitelisting | Application Integrity Control | Comprehensive Malware Protection | Application protection | Windows Startup / Registry Protection | Online banking security | Online payment protection | Data leakage prevention (DLP) | Information security in medicine
  License   Press Center   Awards   Contacts   Sitemap   RSS 
SafenSoft, 2004-2017. All rights are reserved. Privacy policy