Protegent 360 - Complete Security Software

protegent-complete

“It’s time to think beyond Anti-Virus”

Anti-virus, Internet Security and Total Security are common words describing security softwares, but only for Internet threats. The new buzz word, Complete Security is on priority from the broader aspect for individual users and enterprise users. Complete Security not only means protection from Internet Threats but also protection from data theft, unethical activity and physical theft.

download buy

The word “Protegent” is deciphered from protégér (“To Protect” – in French). Complete Security is what is offered in Unistal’s Protegent360. Protegent360 encompasses security from internet threats and data safety through its four modules which are Protegent Total Security, Activity Monitoring, Port Locker and Locate Laptop. Protegent Total security is designed for countering internet threats. It is simple to use yet a sophisticated protection is guaranteed from all kinds of spywares, malwares, e-threats, rootkits and anti-phishing. Its enhanced vulnerability scanner (Inbuilt) has features for Resident Protection, E-mail Scanner, On-Demand Scanner, Virus Vault for safe handling of files and automatic hourly updates. Protegent Total Security boasts of the world's biggest antivirus database engine.

The real challenge is to take maximum efficiency from your subordinates. It has also become important to keep our machine safe from unethical activities during your absence. Activity Monitoring and Reporting helps you in keeping a log of complete work done on the computer. This module reports all the unethically defined activities and sends reports directly to your email. This also helps the organizations to enhance the activity of their staff by 20% as now they are aware that the entire work log is going via email to their Boss restricting them not to do personal chat, web browsing, play games etc.

Should Parents monitor the activities of their teens and pre-teens? It’s a debatable question. But now, Parents need not to be of nagging type as they can have tools that could assist them to monitor all the computer/ internet activities via Protegent 360’s Activity Monitoring & Reporting module.

Keeping the crucial data safe and protected is a challenge for each individual and organization. In today’s world, we require controlling, monitoring and preventing the flow of data from the computer. Port Locker, a data leakage prevention module allows you to protect the flow of data via all the ports, leaving no chance of data theft. This module is also equipped with email filtering, so that the user cannot send files/ mails which are not authorized by the organization. You can make authorised Pendrives whitelisted or read-only for the computers within your organization.

In case if the laptop is lost, missing or stolen, Locate Laptop module helps in finding it the moment it gets connected to the Internet. Its ability to find out the location from the IP with which it is connected to the Internet helps in physical theft prevention of the Laptop. If Laptop does not get connected to Internet for a specified time, this module automatically encrypts the important data folder and makes it unusable for others.

Unistal’s Protegent360, the complete security software covers all the four aspects of complete security. This is a feature-rich software beyond comparison. Protegent powers up 60% more features than any other nearest competitive software. The free trail version of the Software can be downloaded from www.protegent360.com. For more details contact tpm@unistal.com.

Description of Protegent360 Modules

  • Protegent Total Security

Protegent Total Security keeps your Internet-connected family safe. The antivirus solution provides high-end proactive protection from deadliest viruses, spywares, hackers and other e-threats. Protegent Total Security is a time tested antivirus solution and known for its superior quality and effectiveness. It’s hourly virus signature update module always protects your computer from latest viruses.

  • Activity Reporter

Activity Reporter is a very important tool to monitor the activities of all the computer users. It records and reports every key stroke/ activity on the computer or internet and report is generated and emailed on regular basis. The unique feature of Activity Reporter to Whitelist and blacklist applications would enable you to monitor more effectively. The various options of reporting along with the different formats of reporting ensure that monitoring is effective and the network is more secured. The features of Activity Reporter would definitely act as a foil for anyone to do any fraudulent activities in the organization. It helps the user to find out if any unwanted activity has taken place in his/her absence. It also helps Parents to find out the activities of their children.

  • Port Locker & Data Leakage Prevention

Port Locker allows the user to safeguard data/files from unauthorized access. It prevents vital & important data to be transferred from one PC to another using Flash drive, DVD/CD writers, PCMCIA ports, Ethernet ports, Printer ports, Infrared ports and Bluetooth ports. It provides the options to lock/unlock single or multiple ports with authorized password. It allows user to lock ports with different lock type options which are, permanent, specific time duration (scheduled block) and when the computer remains idle or untouched. It displays the alert as soon as an unauthorized action is performed against the locked ports. It provides complete log related to Permanently Blocked, Schedule Blocked or Un-Blocked Ports with actions performed including changes in settings, locking and unlocking the ports, setting scheduler etc. Users can Whitelist one or more pen drives so that they can be accessed on the system. You can also make the USB port read-only so that the data can only be transferred from Pendrive to the system. This feature also provides the file transfer log through USB ports.

  • Locate Laptop & Data Encryption

Locate Laptop keeps a track of laptop's location whenever the laptop gets connected to the internet. What is lost is not just the laptop, but also the valuable, sensitive and creative data in it. It contains a smart agent, designed to collect and transmit critical data needed to pinpoint its location to identify the unauthorized user in case of theft. It works in a stealth mode and can also silently inform you about the location of your employee's laptop. Predefined settings allow the user to encrypt classified files and folders whenever the laptop is not connected to the internet for specified period or is detected stolen. It provides a secure webpage for every user to monitor the Location, IP Address, and Internet Service Provider with date and time. It allows the user to submit the Theft Report online and provides regular Status Updates of the laptop location via email.

  • Crash Proof

Time waits for none. The same holds true for competitive business environment today. You need to keep going in order to stay relevant and ahead of competitive forces in these testing times. Moreover, the digital era has lead to increased dependency of organizations on computers and other advanced devices of the information age. This dependency makes modern organizations and computer users vulnerable to the risks of digitization. Your data and information can easily fall prey to the plight of a virus attack, accidental disk formatting, voltage glitches and any other data loss scenarios. Crash Proof safeguards your vital data against permanent data loss. It is a deletedfilerecovery module, which once installed captures disk images, to back up your data, and keeps on updating it, thereby enabling you to avert all data loss scenarios occurring in future. 

Features of Protegent 360-Complete Laptop Security Software


Protegent Total Security

Antivirus & Antispyware
Protegent Total Security cures and protects your computer from all kind of viruses, Trojans, Spywares, Root kits, and Malwares. It helps you to keep your system clean and healthy.

 

Password Manger
Password Manager feature helps the user to protect the settings with a password.

Anti spam
Anti spam feature blocks unwanted mails to come to the mail client Inbox on your system.
  Tune-Up
Removes unnecessary files and registry entries, for optimized performance
Wi-Fi Management
Wi-Fi Management feature helps you to monitor your Wi-Fi network and provide you the information if any other system connects to your Wi-Fi network.
  File Shredder
File Shredder permanently erases files and their traces from your system.
Anti phishing
Anti-phishing feature blocks all the WebPages which support virus’s scams and personal data phishing attempts.
  SafePay
Whether you are at home or in an airport you can shop online
or pay your bills without worries. Protegent Safpay TM
offers you a scure environment for all your online transactions.
Scan Dispatcher
Triggers system scan when resources usage falls below a certain threshold to avoid any impact on your system’s performance
  Registry Cleaner
Registry Cleaner option helps you to keep the registry clean. It helps you to remove the unwanted registry items.
Active Virus Control
Active Virus Control continuously monitors the applications running on the computer, looking for malware-like actions.
  Personal Data filter
Prevents critical data, such as your social security number, from ever leaving your computer
Virtualized Browser
Isolates browser to a Protegent-provided environment to block web based threats
  Silent Mode
Minimizes system interruptions during standard system processes.

Activity Reporter

Monitor Keystrokes
Captures all key strokes. Intercept DOS-box and Java –chat Keystrokes.
  Monitor Clipboard Activity
Captures Clipboard content
Monitor Internet Activity
Captures all Internet activity with features of Blacklist and Whitelist
Blacklist- Internet activities (web sites) which are added in this list are monitored and visible in alerts.
White list- Internet activities which are added in this list are ignored and not visible in alerts
  Monitor Screenshots
Captures the Screenshot within a specified time Interval or on every mouse click.
Monitor Chat Activity
Captures ICQ, Miranda, Skype, Google Talk , MSN, AIM, AOL, Yahoo, QIP Chats
  Monitor Application Activity
Captures all system application activities with features of Blacklist and Whitelist
Blacklist- All the application activities that are added will get captured and are visible in alerts.
White list- All the application activities that are added in this list are ignored and not visible in alerts.

Port Locker & Data Leakage Prevention

Block ports
You can block all the ports with the help of Port Locker, to prevent your system from unauthorized access. You can block USB port, Bluetooth port, Infrared port, IEEE 1394 port, Network Adaptors port.
  Block /Unblock as per schedule or block port when system idle
Multiple or Single ports can be blocked permanently, scheduled or when you leave your system idle. Only the authorized user can unblock the Port by using the password.
USB read-only feature
Option of assigning USB read-only setting to whitelisted and non-whitelisted USB mass storage device.
  Block CD/DVD
Removable or Inbuilt CD/DVD ROM can be blocked by blocking CD/DVD ROM port.Noone will be able to read or write the CD/DVD from the system.
Log Settings
Easy to manage the logs by setting log days (min 1 day to max 90 days).
  Email Filtering
Robust feature of E-mail Filtering, which filters and blocks emails which are being sent from MS Outlook client.
Block Printer
No Print command will work when the Printer port is blocked.
  Block/Unblock Single/All Ports
You can block/ unblock Multiple or single port in one shot.
Save the settings
The software has the option to save software settings so that they can be restored when needed.
  File Transfer Log
File Transfer Log shows a detailed report of files added, removed and renamed to and from USB mass storage device.

Locate Laptop & Data Encryption

Tamper Proof Reporting
Reports on server contain information on date, time, Public IP. Location, country, state, city, ISP, Longitude & Latitude. No human intervention is required for reports.
  Automated Data Encryption
Remotely launch the data encryption module on predefined sensitive files and folders. Encrypts data even if laptop is not connected to Internet for a particular period.
Laptop/employee tracking
The software has the tendency to monitor the laptop/employee tracking in such a way that has proven its security quality.
   

Crash Proof

Deleted file/folder recoveryg
The module supports recovery of deleted files and folders of your computer, even if they are not present in the recycle bin.
  Repair corrupted/deleted partition
You can successfully repair corrupt partition, damaged on account of accidental deletion or virus attack.
Unformat formatted drives
Crash proof makes it easy to unformat the formatted drives and bring back the file system to pre-format status. This is achieved through revival from the replica of file system stored at a different location on the hard disk.
  Repair in case of FAT/MFT corruption
It is also capable of building back your FAT/MFT file systems, thereby ensuring 100% data recovery in case of file system corruption.

How it works? (Animated Demo)

Protegent 360 is a complete package to encompass security from internet threats and data safety. This package provides you the four tier protection. The Software works as follows:

You need to put the CD in CD drive and need to select the option from the list that you want to install in your system. If you want to provide a four tier protection to your system then select all the options and install it in your system. Post this, configure accordingly and it will start protecting your system.

System requirements

You may install only on computers running the following Operating Systems:
  • Windows XP with Service Pack 3 (32-bit).
  • Windows Vista with Service Pack 2.
  • Windows 7 with Service Pack 1
  • Windows 8
Before installation, make sure that your computer meets the minimum system requirements.
info  Note
To find out the Windows Operating System and hardware information of your computer, right-click 'My Computer' from the desktop and then select 'Properties' from the menu.

Minimum system requirements

  • 1.8 GB available Hard Disk space (at least 800 MB on the system drive)
  • 800 MHz Processor
  • 1 GB RAM

Recommended system requirements

  • 2.8 GB available Hard Disk space (at least 800 MB on the system drive)
  • Intel CORE Duo (1.66 GHz) or equivalent Processor
  • RAM:
    • 1 GB for Windows XP
    • 1.5 GB for Windows Vista, Windows 7 and Windows 8 & Windows 10

Software requirements

To be able to use Protegent and all its features, your computer needs to meet the following software requirements:
  • Internet Explorer 7 or higher
  • Mozilla Firefox 3.6 or higher
  • Yahoo! Messenger 8.1 or higher
  • Microsoft Outlook 2007 / 2010
  • Microsoft Outlook Express and Windows Mail (on 32-bit systems)
  • Mozilla Thunderbird 3.0.4
  • .NET Framework 3

Why use Protegent 360 - Complete Laptop Security Software?

A highly interactive software –Protegent 360 Complete Security Software is designed to provide complete security to the users against all the malwares, root kits, spywares, and e-threats. This software helps the user to track his/her laptop in case of theft. You can monitor all the activities of your employees/children and easily encrypt your data in case of theft. It provides firewall option as well.

Experience a brighter tomorrow ………………………..Today

 

 

Product Updates

icon Unistal’s Locate Laptop updated with various features on 23-Nov-2016. Some of the features are Selective Data Decryption, Image Capturing, Pin Point Location, etc....more

icon Unistal’s SysBoost is released on 10-Oct-2016. SysBoost is an advance software used to manage, maintain and optimize the performance of computer system....more

Events

Unistal Has Sponsored Stek Partners Summit at Allahabad on 1st Oct 2017 at Allahabad again where in Unistal showcased it's complete range of products and got tremendous response from the partners. more...
Protegent Dealer meet at Chanderpur, Maharashtra (8 july 2017) more...
Unistal Has Participated at FONOCOM from 14thth to 16th FEB. 2014 at Indore. where in Unistal has showcased it's complete range of products and got tremendous response from the partners. more...