The rising number of harmful codes which are encountered “In-the-wild” and transferred throughout the
internet have grown dynamically throughout the last few years. The whole figure has overreached one
million of known examples and every week this figure is continually expanding. It is against these threats that we need to be protected.
Features of TrustPort Antivirus
- antivirus, antispam, antispyware
- scanning of incoming e-mails
- internet scanner
- on-demand scanning
- real-time protection
- advanced heuristics
- technology of virtual computer
- Real-time Protection
On Access protection monitors and controls all opened files and everything
else that the user is currently working on. In the case that the user opens a
virus infected file in the system, the antivirus program with the help of residential
protection will announce to the user that the specific file is infected.
What happens then to the infected file depends on the configuration.
- On-Demand Scanner
Acts as a manual scanning tool which enables the users to scan specific
files and individual disk drives. The procedure can be started from the
taskbar or from the context menu of individual files. When an infected file
is found, the program operates an action which is pre determined by the
- Internet Scanner
In the case that the system is connected to a network, the internet scanner
will make sure that all infected files are revealed and eliminated before they
are saved on the disk. The internet scanner is made up of the following
- Antivirus protection of e-mail
- Antispam protection of e-mail
- Web scanner
Its main purpose is to isolate infected files that have been caught by the
antivirus program; these files can then be deleted or renewed. Every infected
file comes with a report containing the following information: name of
file, time and date of transfer to quarantine and original location.
- Scanning engines
At the heart of the program are the scanning antivirus and antispyware
engines which are all from renowned world manufactures. Their combined
maximal integration mean the highest possible protection against harmful
codes. The engines excel thanks to their unique technologies, for example
heuristic analysis or the technology of virtual computer, which are able to
identity unknown viruses which have yet not been included in databases of
virus signatures. Therefore they are able to offer protection in the beginning
stages of potential epidemics. In the program the user is able to configure
which particular scanner he wants to assign to selected engines. This
means that the user can configure the antivirus program exactly for their
It is an effective feature which enables the user to gain related information
about activities and operations that have been performed. The user can
then refer back to the information and use it for monitoring of the system or
the monitoring of the antivirus program itself.
The user can configure the planner in such a way that after a certain period
of time the antivirus program automatically actualizes through the internet.
This can be incremental or automatically switched on upon demand.
- Central management
TrustPort Antivirus is compatible with central report TrustPort Management
which enables administrators to remotely repair.