- Host Intrusion Prevention System (HIPS). Host Intrusion Prevention System monitors a single host for suspicious activity by analyzing events occurring within that host. HIPS solutions protect the host from the network layer all the way up to the application layer against known and unknown malicious attacks. In case of attempted operating system or application changes by a hacker or malware, HIPS blocks the action and alerts the user so an appropriate decision on next steps can be made.
- Whitelisting. Application whitelisting is the complete opposite to the blacklisting approach used in traditional anti-viruses. Traditional anti-viruses use signature databases, which can be considered as a blacklist of program code not wanted on a machine. If the application contains code included in anti-virus signature base, this application will be blacklisted, and the anti-virus will consider it as malicious application and block it. Traditional anti-virus lets everything run except applications it knows are bad. As the number of new malicious programs increases exponentially, the signature blacklists canít be updated quickly enough, so new malicious applications are able to run.
- Application Integrity Control. A critical part of any IT system is that applications perform correctly, that is to say, with integrity. Sometimes, application integrity can be accidentally broken: executable files or libraries may be changed or deleted, which will cause the application to be unstable.
- Application protection. Applications control access to information stored locally or remotely - from credit card account details and email addresses to personal data, health records, and customer information. So, to achieve effective data security, you need application protection.
- Windows Startup / Registry Protection. Without Windows registry protection, your PC is extremely vulnerable - if malware is able to tamper with the system registry, the computer will not function correctly. The Windows Registry is a hierarchical database that stores configuration settings and options used by the operating system - hardware preferences, where programs are stored, listings of all your Start-menu shortcuts, pointers to the programs that start up when you click on a desktop icon, and what programs are allowed to be start up at the same time as Windows. Registry protection is essential for the normal operation of your PC.
- Online banking security. The standard method for obtaining online banking credentials is social engineering or phishing, often in conjunction with a Banking Trojan. Two of most widespread such targeted malware programs are Zeus and SpyEye, which together have compromised millions of computers since they first appeared.
Print this page