Anti-Malware

Anti-Malware

 

MULTI-LAYERED

 

ANTI-MALWARE

 

The Network Box Anti-Malware system provides 16 anti-malware engines, running over 12 million signatures, to identify and prevent viruses, trojans, worms and other malicious software, from infecting your networked systems or networked smart devices.

 

Additionally, the anti-malware system transparently scans and analyzes incoming and outgoing SMTP emails, HTTP and FTP protocols for malware. Even attachments such as .exe.zip files, and other compression and encoding formats are decoded and scanned. Furthermore, external emails from POP3 and IMAP accounts are also scanned to ensure your network is secured.

 

The malware signature database that powers the anti-malware system is updated in real-time, using Network Box's patented PUSH Technology.

 

 

 

Anti-Malware

Engines

 

Crypto Hash Checks

Compares each object in the message with a database of malicious object signatures.

 

Regular Expression Checks

Uses regular expressions to look for common malicious code structures.

 

Illegal MIME

Looks for illegal structures and formatting in MIME email messages.

 

Kaspersky Message Scanner

Used to run the Kaspersky AVP anti-virus scanner against the entire message.

 

Kaspersky Object Scanner

Used to run the Kaspersky AVP anti-virus scanner against unpacked objects found inside the email message.

 

Clam Object Scanner

Used to optionally run the Clam anti-virus scanner against unpacked objects found inside the email message.

 

Bagle Variant Heuristics

Used to block new, emerging, variants of the Bagle family of viruses.

 

 

Hidden Executable Heuristics

Used to determine if executable code is hiding in non-executable file extensions.

 

Class ID Heuristics

Checks CLASSID extensions in attached files, as this is a common technique used to bypass anti-virus scanning, or exploit mail reader vulnerabilities.

 

Blank Extension Heuristics

Checks file extensions, looking for certain types of blank extension commonly used to bypass anti-virus scanning, or exploit mail reader vulnerabilities.

 

Multiple Extension Heuristics

Checks for certain classes of multiple extensions, commonly used to bypass anti-virus scanning, or exploit mail reader vulnerabilities.

 

Z-Scan

An in-the-cloud defense shield that provides fast and effective protection against emerging zero-day malware.

 

 

Malware engines info

 

 

Key Features

Engines and Singnatures

16 Engines

12,000,000+ Malware Signatures*

100% Triple Tolly rating

Triple 100% Tolly Group detection rating against their Extended Wildlist Malware database over HTTP, SMTP and POP3 protocols.

Mobile malware protection

Anti-mobile malware protection.

 

 

*For more information and real-time statistics:

Go to Security Response site



七星彩万能8码组合 pk10破解器 手机版 二人麻将棋牌官方网站 360竞彩混合投注比分 时时彩单双大小有规律 倍投方案图片 赛车不定位八码技巧 最稳的计划软件下载 pk10高手云集5码精准计划 mg线上娱乐 2码倍投 11选5背后是不是有人在控制 赌大小单双的技巧规律 彩神官网下载 彩票单双大小规律贴吧 3d单选包胆