Smart Scan
|
Worry-Free Business Security
Services
uses smart scan to make the scanning process more efficient. This
technology works by off-loading a large number of signatures
previously stored on the local endpoint to Smart Protection Sources.
Using this approach, the system and network impact of the
ever-increasing volume of signature updates to endpoint systems is
significantly reduced.
|
Damage Cleanup Services
|
Damage Cleanup
Services™
cleans
computers of file-based and network viruses, and virus and worm
remnants (Trojans, viral files) through a fully-automated process.
To address the threats and nuisances posed by
Trojans, Damage Cleanup
Services does the following:
-
Detects and removes live Trojans
-
Kills processes that Trojans create
-
Repairs system files that Trojans
modify
-
Deletes files and applications that
Trojans drop
Because Damage Cleanup Services runs
automatically in the background, it is not necessary to configure
it. Users are not even aware when it runs. However,
Worry-Free Business Security
Services
may sometimes notify
users to restart their endpoints to complete the process of removing
a Trojan.
|
Security Risk Protection
|
Worry-Free Business Security
Services
protects
endpoints from security risks by scanning files and then performing a specific action
on
each security risk detected. An overwhelming number of security risks detected over
a short
period of time signals an outbreak.
Worry-Free Business Security
Services
notifies you of any outbreak so you can take immediate action, such as
cleaning infected endpoints and isolating them until they are completely risk-free.
|
Web Reputation
|
Web Reputation technology proactively protects endpoints within or outside
the corporate network from malicious and potentially dangerous websites. Web Reputation
breaks the infection chain and prevents downloading of malicious code.
Verify the credibility of websites and pages by integrating Worry-Free
Business Security with the Smart Protection Server or the Trend Micro Smart Protection
Network.
|
Security Agent
self-protection
|
-
Enhanced file integrity monitoring ensure the validity
and availability of the Security Agent program files.
-
Protection against the blocking of the Security Agent
processes.
-
Prevents users without administrator privileges from accessing the agent
log directory on endpoints.
|
URL filtering
|
URL filtering helps you control access to websites to reduce unproductive employee
time,
decrease Internet bandwidth usage, and create a safer Internet environment.
|
Endpoint Sensor
|
Endpoint Sensor is a powerful monitoring and investigation tool used to identify the
presence, location, and entry point of threats. Through the use of detailed system
event
recording and historical analysis, you can perform preliminary investigations to discover
hidden threats throughout your network and locate all affected endpoints. Generate
root
cause analysis reports to understand the nature and activity of the malware since
the threat
entered the endpoint.
|