OfficeScan provides the following
features and benefits:
-
Plug-in Manager and Plug-in Solutions
Plug-in Manager facilitates the
installation, deployment, and management of plug-in solutions.
Administrators can install two kinds of plug-in solutions:
-
Security Risk Protection
OfficeScan protects computers
from security risks by scanning files and then performing a specific
action for each security risk detected. An overwhelming number of
security risks detected over a short period of time signals an outbreak.
To contain outbreaks,
OfficeScan enforces outbreak
prevention policies and isolates infected computers until they are
completely risk-free.
OfficeScan uses
smart scan to make the scanning process more efficient. This technology
works by off-loading a large number of signatures previously stored
on the local endpoint to Smart Protection Sources. Using this approach,
the system and network impact of the ever-increasing volume of signature
updates to endpoint systems is significantly reduced.
-
Damage Cleanup Services
Damage
Cleanup Services™ cleans
computers of file-based and network viruses, and virus and worm
remnants (Trojans, registry entries, viral files) through a fully-automated
process. To address the threats and nuisances posed by
Trojans, Damage Cleanup Services does the
following:
-
Detects and removes live Trojans
-
Kills processes that Trojans create
-
Repairs system files that Trojans modify
-
Deletes files and applications that Trojans drop
-
Web Reputation
Web
reputation technology proactively protects
agent computers within
or outside the corporate network from malicious and potentially dangerous
websites. Web reputation breaks the infection chain and prevents
downloading of malicious code.
-
OfficeScan Firewall
The OfficeScan firewall protects agents and servers on the
network using stateful inspections and high performance network virus scans.
-
Data Loss Prevention
Data Loss Prevention safeguards
an organization’s digital assets against accidental or deliberate
leakage. Data Loss Prevention allows administrators to:
-
Identify
the digital assets to protect
-
Create policies that limit or prevent the transmission of
digital assets through common transmission channels, such as email
messages and external devices
-
Enforce compliance to established privacy standards
-
Device Control
Device
Control regulates access to external storage devices and network resources
connected to computers. Device Control helps prevent data loss and
leakage and, combined with file scanning, helps guard against security risks.
-
Behavior Monitoring
Behavior Monitoring constantly
monitors agents for
unusual modifications to the operating system or on installed software.