Plug-in Manager and Plug-in Solutions
|
Plug-in Manager facilitates the
installation, deployment, and management of plug-in solutions.
Administrators can install two kinds of plug-in solutions:
|
Security Risk Protection
|
OfficeScan protects computers from security risks by scanning files and then
performing a specific action for each security risk detected. An overwhelming number
of
security risks detected over a short period of time signals an outbreak. To contain
outbreaks, OfficeScan enforces
outbreak prevention policies and isolates infected computers until they are completely
risk-free.
OfficeScan uses smart scan to make the scanning process more efficient. This
technology works by off-loading a large number of signatures previously stored on
the local
endpoint to Smart Protection
Sources. Using this approach, the system and network impact of the ever-increasing
volume of
signature updates to endpoint systems is significantly reduced.
|
Damage Cleanup Services
|
Damage Cleanup Services™
cleans computers of file-based and network
viruses, and virus and worm remnants (Trojans, registry entries, viral files) through
a
fully-automated process. To address the threats and nuisances posed by Trojans, Damage Cleanup Services does the following:
-
Detects and removes live Trojans
-
Kills processes that Trojans create
-
Repairs system files that Trojans modify
-
Deletes files and applications that Trojans drop
|
Web Reputation
|
Web reputation technology
proactively protects agent computers within or outside the corporate network from
malicious and potentially dangerous websites. Web reputation breaks the infection
chain and
prevents downloading of malicious code.
|
OfficeScan
Firewall
|
The OfficeScan
firewall protects agents and servers on the network using stateful inspections and high
performance network virus scans.
|
Data Loss Prevention
|
Data Loss Prevention safeguards an organization’s digital assets
against accidental or deliberate leakage. Data Loss Prevention allows administrators
to:
-
Identify the digital assets to protect
-
Create policies that limit or prevent the transmission of digital
assets through common transmission channels, such as email messages and external
devices
-
Enforce compliance to established privacy standards
|
Device Control
|
Device Control regulates access to
external storage devices and network resources connected to computers. Device Control
helps
prevent data loss and leakage and, combined with file scanning, helps guard against
security
risks.
|
Behavior Monitoring
|
Behavior Monitoring constantly monitors agents for unusual
modifications to the operating system or on installed software.
|