Windows
Mac OS
Mobile

Latest news: November 12th, 2016 - We have found a new undetectable keyloggers for you. RSS Feed

Home>World news>Check Point delivers encryption to SMEs

AnyKeylogger for Mac

Check Point delivers encryption to SMEs

Network security firm Check Point today launched a new version of its consumer security suite designed specifically to meet the increasingly sophisticated security needs of small and home business users.

ZoneAlarm Extreme Security 2010 features new 256-bit AES hard disk encryption, giving users greater peace of mind if their laptop is lost or stolen. According to the vendor, around three quarters of ID theft cases result from lost or stolen devices.

ZoneAlarm’s encryption technology is based on Check Point’s enterprise and government-grade Endpoint Security Full Disc Encryption solution, ensuring that all data including temporary files, hidden or deleted files and cookies stored on the device are unreadable to thieves or unauthorised users.

Users also have access to a 24/7 password recover service, should they forget log-in details.

"With its hard disk encryption, ZoneAlarm Extreme Security 2010 is particularly suited to the home and small business laptop user because it gives full, enterprise-grade protection for their confidential data wherever they are, online or offline,” argued Check Point regional director northern Europe, Nick Lowe.

Other features of the new suite include Advanced Download Protection functionality which automatically checks and analyses any programs being downloaded by the user to see if they are malicious or not.

An enhanced scanning engine, 85 per cent faster than in previous versions, enables quick and easy detection and removal of malware, said Check Point.

ZoneAlarm also includes an operating system firewall and virtual browsing – a feature which allows users to surf the web without exposing themselves to attack via browser exploits or drive-by-downloads.

ZoneAlarm Extreme Security 2010 is available today from the ZoneAlarm web site.
Home>World news>Check Point delivers encryption to SMEs
IMPORTANT! Installing computer monitoring tools on computers you do not own or do not have permission to monitor may violate local, state or federal law.