01

Description and

Overview

features

 

all complex threats that endanger a network, from a small local area to large multi-server, multi-platform WAN's.

Your Ultimate Protection. The final frontier for any possible threat to your computer system. As virus detection based on code analysis has not always offered good results, BitDefender has implemented behavior-based protection, providing security against born-new malware. MIDAS (Malware Intrusion Detection Advanced System), featuring three levels of security, guarantees your serenity even after the fastest epidemics.

These are the costs that organizations want to avoid and what the security products are designed to prevent:

Worm attacks

Communication loss because of infected e-mails

E-mail breakdown

Cleaning and recovering systems

Lost productivity experienced by end users because systems are not available

Hacking, and unauthorized access that causes damage

Some simultaneously developments and benefits can be accomplished by using the BitDefender security suite:

Increase network availability by stopping the spread of malicious code attacks (i.e., Nimda, Trojan horses, DDoS).

Protect remote users from attacks.

Reduce administrative costs and deploys rapidly with BitDefender Enterprise management capabilities.

Stop the spreading of malware through e-mail, using a BitDefender e-mail protection at the company's gateway. Temporarily or permanently block unauthorized, vulnerable, and expensive application connections.

1.2.Data Security Division

Ever since the beginning, SOFTWIN's Data Security Division approached data protection in a specific manner, with the first intelligent update, requiring no user intervention, the first remote antivirus management through WAP technology or the first Personal Firewall to be integrated within an antivirus engines to provide complete response to today's complex security threats.

Born to provide full data security at all critical levels in today's business environment, Data Security Division aims to ensure the protection of systems against computer

20

Page 20
Image 20
Unisar 1.24.1867 manual Data Security Division