Protegent 360 - Complete Security Software
“It’s time to think beyond Anti-Virus”
Anti-virus, Internet Security and Total Security are common words describing security softwares, but only for Internet threats. The new buzz word, Complete Security is on priority from the broader aspect for individual users and enterprise users. Complete Security not only means protection from Internet Threats but also protection from data theft, unethical activity and physical theft.
The word “Protegent” is deciphered from protégée (“To Protect” – in French). Complete Security is what is offered in Unistal’s Protegent360. Protegent360 encompasses security from internet threats and data safety through its four modules which are Protegent Total Security, Activity Monitoring, Port Locker and Locate Laptop. Protegent Total security is designed for countering internet threats. It is simple to use yet a sophisticated protection is guaranteed from all kinds of spywares, malwares, e-threats, rootkits and anti-phishing. Its enhanced vulnerability scanner (Inbuilt) has features for Resident Protection, E-mail Scanner, On-Demand Scanner, Virus Vault for safe handling of files and automatic hourly updates. Protegent Total Security boasts of the world's biggest antivirus database engine.
The real challenge is to take maximum efficiency from your subordinates. It has also become important to keep our machine safe from unethical activities during your absence. Activity Monitoring and Reporting helps you in keeping a log of complete work done on the computer. This module reports all the unethically defined activities and sends reports directly to your email. This also helps the organizations to enhance the activity of their staff by 20% as now they are aware that the entire work log is going via email to their Boss restricting them not to do personal chat, web browsing, play games etc.
Should Parents monitor the activities of their teens and pre-teens? It’s a debatable question. But now, Parents need not to be of nagging type as they can have tools that could assist them to monitor all the computer/ internet activities via Protegent 360’s Activity Monitoring & Reporting module.
Keeping the crucial data safe and protected is a challenge for each individual and organization. In today’s world, we require controlling, monitoring and preventing the flow of data from the computer. Port Locker, a data leakage prevention module allows you to protect the flow of data via all the ports, leaving no chance of data theft. This module is also equipped with email filtering, so that the user cannot send files/ mails which are not authorized by the organization. You can make authorised Pendrives whitelisted or read-only for the computers within your organization.
In case if the laptop is lost, missing or stolen, Locate Laptop module helps in finding it the moment it gets connected to the Internet. Its ability to find out the location from the IP with which it is connected to the Internet helps in physical theft prevention of the Laptop. If Laptop does not get connected to Internet for a specified time, this module automatically encrypts the important data folder and makes it unusable for others.
Unistal’s Protegent360, the complete security software covers all the four aspects of complete security. This is a feature-rich software beyond comparison. Protegent powers up 60% more features than any other nearest competitive software. The free trail version of the Software can be downloaded from www.protegent360.com. For more details contact email@example.com.
Description of Protegent360 Modules
- Protegent Total Security
Protegent Total Security keeps your Internet-connected family safe. The antivirus solution provides high-end proactive protection from deadliest viruses, spywares, hackers and other e-threats. Protegent Total Security is a time tested antivirus solution and known for its superior quality and effectiveness. It’s hourly virus signature update module always protects your computer from latest viruses.
- Activity Reporter
Activity Reporter is a very important tool to monitor the activities of all the computer users. It records and reports every key stroke/ activity on the computer or internet and report is generated and emailed on regular basis. The unique feature of Activity Reporter to Whitelist and blacklist applications would enable you to monitor more effectively. The various options of reporting along with the different formats of reporting ensure that monitoring is effective and the network is more secured. The features of Activity Reporter would definitely act as a foil for anyone to do any fraudulent activities in the organization. It helps the user to find out if any unwanted activity has taken place in his/her absence. It also helps Parents to find out the activities of their children.
- Port Locker & Data Leakage Prevention
Port Locker allows the user to safeguard data/files from unauthorized access. It prevents vital & important data to be transferred from one PC to another using Flash drive, DVD/CD writers, PCMCIA ports, Ethernet ports, Printer ports, Infrared ports and Bluetooth ports. It provides the options to lock/unlock single or multiple ports with authorized password. It allows user to lock ports with different lock type options which are, permanent, specific time duration (scheduled block) and when the computer remains idle or untouched. It displays the alert as soon as an unauthorized action is performed against the locked ports. It provides complete log related to Permanently Blocked, Schedule Blocked or Un-Blocked Ports with actions performed including changes in settings, locking and unlocking the ports, setting scheduler etc. Users can Whitelist one or more pen drives so that they can be accessed on the system. You can also make the USB port read-only so that the data can only be transferred from Pendrive to the system. This feature also provides the file transfer log through USB ports.
- Locate Laptop & Data Encryption
Locate Laptop keeps a track of laptop's location whenever the laptop gets connected to the internet. What is lost is not just the laptop, but also the valuable, sensitive and creative data in it. It contains a smart agent, designed to collect and transmit critical data needed to pinpoint its location to identify the unauthorized user in case of theft. It works in a stealth mode and can also silently inform you about the location of your employee's laptop. Predefined settings allow the user to encrypt classified files and folders whenever the laptop is not connected to the internet for specified period or is detected stolen. It provides a secure webpage for every user to monitor the Location, IP Address, and Internet Service Provider with date and time. It allows the user to submit the Theft Report online and provides regular Status Updates of the laptop location via email.
Features of Protegent 360-Complete Laptop Security Software
Protegent Total Security
Antivirus & Antispyware
Anti spam feature blocks unwanted mails to come to the mail client Inbox on your system.
Removes unnecessary files and registry entries, for optimized performance
Wi-Fi Management feature helps you to monitor your Wi-Fi network and provide you the information if any other system connects to your Wi-Fi network.
File Shredder permanently erases files and their traces from your system.
Anti-phishing feature blocks all the WebPages which support virus’s scams and personal data phishing attempts.
Whether you are at home or in an airport you can shop online
or pay your bills without worries. Protegent Safpay TM
offers you a scure environment for all your online transactions.
Triggers system scan when resources usage falls below a certain threshold to avoid any impact on your system’s performance
Registry Cleaner option helps you to keep the registry clean. It helps you to remove the unwanted registry items.
|Active Virus Control
Active Virus Control continuously monitors the applications running on the computer, looking for malware-like actions.
|Personal Data filter
Prevents critical data, such as your social security number, from ever leaving your computer
Isolates browser to a Protegent-provided environment to block web based threats
Minimizes system interruptions during standard system processes.
Captures all key strokes. Intercept DOS-box and Java –chat Keystrokes.
|Monitor Clipboard Activity
Captures Clipboard content
|Monitor Internet Activity
Captures all Internet activity with features of Blacklist and Whitelist
Blacklist- Internet activities (web sites) which are added in this list are monitored and visible in alerts.
White list- Internet activities which are added in this list are ignored and not visible in alerts
Captures the Screenshot within a specified time Interval or on every mouse click.
|Monitor Chat Activity
Captures ICQ, Miranda, Skype, Google Talk , MSN, AIM, AOL, Yahoo, QIP Chats
|Monitor Application Activity
Captures all system application activities with features of Blacklist and Whitelist
Blacklist- All the application activities that are added will get captured and are visible in alerts.
White list- All the application activities that are added in this list are ignored and not visible in alerts.
Port Locker & Data Leakage Prevention
You can block all the ports with the help of Port Locker, to prevent your system from unauthorized access. You can block USB port, Bluetooth port, Infrared port, IEEE 1394 port, Network Adaptors port.
|Block /Unblock as per schedule or block port when system idle
Multiple or Single ports can be blocked permanently, scheduled or when you leave your system idle. Only the authorized user can unblock the Port by using the password.
|USB read-only feature
Option of assigning USB read-only setting to whitelisted and non-whitelisted USB mass storage device.
Removable or Inbuilt CD/DVD ROM can be blocked by blocking CD/DVD ROM port.Noone will be able to read or write the CD/DVD from the system.
Easy to manage the logs by setting log days (min 1 day to max 90 days).
Robust feature of E-mail Filtering, which filters and blocks emails which are being sent from MS Outlook client.
No Print command will work when the Printer port is blocked.
|Block/Unblock Single/All Ports
You can block/ unblock Multiple or single port in one shot.
|Save the settings
The software has the option to save software settings so that they can be restored when needed.
|File Transfer Log
File Transfer Log shows a detailed report of files added, removed and renamed to and from USB mass storage device.
Locate Laptop & Data Encryption
|Tamper Proof Reporting
Reports on server contain information on date, time, Public IP. Location, country, state, city, ISP, Longitude & Latitude. No human intervention is required for reports.
|Automated Data Encryption
Remotely launch the data encryption module on predefined sensitive files and folders. Encrypts data even if laptop is not connected to Internet for a particular period.
The software has the tendency to monitor the laptop/employee tracking in such a way that has proven its security quality.
How it works:
Protegent 360 is a complete package to encompass security from internet threats and data safety. This package provides you the four tier protection. The Software works as follows:
You need to put the CD in CD drive and need to select the option from the list that you want to install in your system. If you want to provide a four tier protection to your system then select all the options and install it in your system. Post this, configure accordingly and it will start protecting your system.
- Windows XP with Service Pack 3 (32-bit).
- Windows Vista with Service Pack 2.
- Windows 7 with Service Pack 1
- Windows 8
Before installation, make sure that your computer meets the minimum system requirements.
To find out the Windows Operating System and hardware information of your computer, right-click 'My Computer' from the desktop and then select 'Properties' from the menu.
You may install only on computers running the following Operating Systems:
Minimum system requirements
- 1.8 GB available Hard Disk space (at least 800 MB on the system drive)
- 800 MHz Processor
- 1 GB RAM
Recommended system requirements
- 2.8 GB available Hard Disk space (at least 800 MB on the system drive)
- Intel CORE Duo (1.66 GHz) or equivalent Processor
- 1 GB for Windows XP
- 1.5 GB for Windows Vista, Windows 7 and Windows 8
- Internet Explorer 7 or higher
- Mozilla Firefox 3.6 or higher
- Yahoo! Messenger 8.1 or higher
- Microsoft Outlook 2007 / 2010
- Microsoft Outlook Express and Windows Mail (on 32-bit systems)
- Mozilla Thunderbird 3.0.4
- .NET Framework 3
To be able to use Protegent and all its features, your computer needs to meet the following software requirements:
Why use Protegent 360 - Complete Laptop Security Software?
A highly interactive software –Protegent 360 Complete Security Software is designed to provide complete security to the users against all the malwares, root kits, spywares, and e-threats. This software helps the user to track his/her laptop in case of theft. You can monitor all the activities of your employees/children and easily encrypt your data in case of theft. It provides firewall option as well.
Experience a brighter tomorrow ………………………..Today