Best State of Art IT Security Solutions
The best Innovative and powerful IT Security products

Encyclopedia / Encyclopedia Part 3 /

What is a Virus?

 
A virus is an application with the ability of multiplying itself, which can cause great danger and damage to files or other software on the same machine. A true virus cannot infect another system without human intervention. At any rate, the SecPoint Protector is a unique Unified Threat Management (UTM) appliance that includes very strong anti-virus scanning of all incoming and outgoing mail traffic.

Virus & Trojans are often used in Network compromise attacks

Attackers can utilize a virus to penetrate a network and install malware and trojans on infected systems.
This will allow the attacker to take control of systems and use them in other attacks.

It is recommended to run Anti Virus on workstations and over a network

Always scan all physical media such as DVDs, CDs, USB Sticks, Flash Disks, External harddisks, Flash memory cards and any other device that can contain virus before connecting it to a production system.
 
This innovative SecPoint technology provides real-time bidirectional scanning for all protocols so only clear traffic can pass and the other traffic is blocked
 
Which Vendors are Included in the Protector and Why?
 
We here at SecPoint have chosen to work with the award-winning Kaspersky Labs anti-virus vendor as our number one Anti-Virus Scanning Engine. Kaspersky's anti-virus application is a multiple-award-winning software suite that has proven itself over and over again in delivering the fastest anti-virus database definitions.
 
Kaspersky Lab's expert staff will monitor the present virus situation around the world for twenty-four hours a day and seven days a week. This ensures a rapid response to new viruses. A dedicated team of linguists releases updates to the signature database every 3 hours.
 
We are also using ClamAV as a complementary anti-virus scanning engine. ClamAV is a strong open source anti-virus vendor that has been proven in some cases to catch viruses that commercial anti-virus vendors fail to register. The Protector even has the option to add a third vendor to gain more and more anti-virus checking protection.
 
 

➤ Related pages
Anti Spam Firewall VPN
Appliance VS Software
Cloud Security
WEP Key
What is a Man in the Middle Attack?
What is a Routing Table?
What is CISSP?
What is Data Leak Prevention?
What is Dumpster Diving?
What is Grey Listing?
What is GSM Encryption?
What is Instant Messaging?
What is Port Knocking?
What is search engine hacking?
What is Spyware?
What is TCP?
What is UDP?
What is UTM?
What is Virus?
What is VoIP?
What is Whitelisting?
WiFi Pen Test
WPA Key

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef