SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
REVIEWS - Norton Internet Security 2008 10 User
ViewUserReviews
Average Customer Rating
4.3 out of 5
Product Feature
Norton Identity Safe keeps your personalq
information and identity safe when you buy, bank
and browse online
Start, scan, and run faster. Improved performanceq
delivers an enhanced online experience
Get help fast with free online technical support viaq
live chat and email all from within the product
Optimized product design improves scan timesq
and decreases impact on system startup and
resource usage
SONAR technology delivers behavior-basedq
protection that can detect emerging spyware and
viruses even before traditional signature-based
definitions are available
Read moreq
Product Description
NORTON INTERNET SECURITY 2008 CD SOP 10U UNSPSC CodeUNSPSC Code : 43233203 Product
IDUPC: 037648610056Manufacturer Part: 12608440 Read more
Product Description
Stay protected from the latest online threats. Norton Internet Security 2008 runs quietly in the background to
detect and block today's complex threats and to protect your identity when you buy, bank, or browse online.
The friendly and efficient product design helps minimize confusing security alerts and system slowdowns that
can get in the way of your online experience. And if you need help, an integrated online chat tool connects you
to our support professionals, so you have easy access to the answers you need. In addition to protection
updates, Norton Internet Security provides new product features as available throughout your service
subscription.
Norton Internet Security 2008 runs quietly in the background to detect and block today's complex threats and
to protect your identity when you buy, bank, or browse online.
Stay protected from the latest online threats.
Norton Internet Security 2008 runs quietly in the background to detect and block today's complex threats and
to protect your identity when you buy, bank, or browse online.
Key Benefits
Blocks online identity theft--An extra layer of security protects when you buy, bank, or browse.
Detects and eliminates spyware--Provides advanced protection against today's latest threats.
Removes viruses and Internet worms--Fast and quiet scans provide comprehensive, automatic protection.
Protects against hackers--Safeguards your computer with a smart firewall that automatically configures
protection settings.
Includes Full Versions of the Following Products:
Norton AntiVirus
Norton Personal Firewall
Norton Antispyware
Norton Identity Safe--New!
Norton Antiphishing
New Features and Enhancements--What's New
Norton Identity Safe keeps your personal information and your identity safe when you buy, bank and browse
online.
Enhanced performance lets you start, scan, and run faster, so you can enjoy your online experience.
Get help fast with free online technical support via live chat and email all from within the product.
Optimized product design improves scan times and decreases impact on system startup and resource usage.
SONAR (Symantec Online Network for Advanced Response) technology delivers behavior-based protection that
can detect emerging spyware and viruses even before traditional signature-based definitions are available.
Stores and encrypts your passwords and other confidential data, automatically filling it at your request to save
time and protect it from being stolen by eavesdropping keystroke loggers.
Network security monitoring checks the status of your wireless network security, maps connected devices, and
provides expert advice on managing your network security settings.
Start, scan, and run faster. Improved performance delivers an enhanced online experience.
Norton AntiVirus:
Antivirus and antispyware protection, rootkit detection and intrusion protection
Protects your computer by automatically detecting and removing spyware, viruses, Trojan horses, and Internet
worms.
Exchange files via email and instant messaging without worrying about receiving threats on your computer or
spreading them to others.
Stays out of your way. Runs quietly in the background without requiring you to respond to confusing security
alerts.
Threat blocking technology quietly monitors system activities to stop most spyware, viruses, and worms
before they can install and cause damage on your system.
Email and instant message scanning detects and removes infected attachments even if they're hidden in
archives.
Rootkit detection finds and removes threats that are hidden deeply in the operating system.
Internet worm protection blocks an entire class of viruses, spyware, and worms with a single threat signature.
Thorough pre-installation scan cleans out spyware and virus infections that can obstruct ordinary protection.
Quick Scan automatically runs on receipt of new definitions to help ensure protection against the latest threats.
Full System Scan performs a deep scan of the system and hard drive to remove existing spyware, viruses, and
other threats.
Norton Identity Safe:
Antiphishing, Web site authentication, eavesdropping protection and confidential information management
Advanced phishing protection identifies and blocks fraudulent Web sites designed to steal personal
information.
Adds a layer of targeted, real-time identity theft protection to prevent identity thieves from eavesdropping on
your online shopping transactions and banking and brokerage sessions from login to logout.
Blocks hard-to-detect phishing sites by deeply analyzing Web page elements for evidence of criminal activity.
Authenticates the Web location and credentials of the most popular banking and shopping sites, so you know
you're dealing with the true site and not a fake.
Norton Personal Firewall:
Two-way firewall
Stay hidden when connected with a smart firewall that automatically configures protection settings.
Log on at home, at a cafe, or on the road, and Norton Internet Security automatically optimizes your security
settings.
Two-way firewall blocks hackers from breaking into your computer and stops spyware from transmitting
information.
Trust Control automatically optimizes your protection settings based on the network--wired or wireless, public
or private--to which you're connected.
Additional Features
The Norton Add-on Pack delivers optional solutions for you and your family including antispam and parental
controls.
Connect with confidence knowing your protection is continuously updated for one year as new threats emerge.
Includes protection updates and new product features as available throughout the renewable service period.
Intrusion prevention shields newly discovered security holes in the operating system and applications to
prevent viruses, worms, and hackers from entering through these vulnerabilities.
Includes one year of automatic definition updates, new product features, and access to updated versions of
Norton Internet Security throughout the life of your service subscription.
Read more
Norton internet security 2008 10 user

Más contenido relacionado

Último

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 

Último (20)

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 

Destacado

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Destacado (20)

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 

Norton internet security 2008 10 user

  • 1. REVIEWS - Norton Internet Security 2008 10 User ViewUserReviews Average Customer Rating 4.3 out of 5 Product Feature Norton Identity Safe keeps your personalq information and identity safe when you buy, bank and browse online Start, scan, and run faster. Improved performanceq delivers an enhanced online experience Get help fast with free online technical support viaq live chat and email all from within the product Optimized product design improves scan timesq and decreases impact on system startup and resource usage SONAR technology delivers behavior-basedq protection that can detect emerging spyware and viruses even before traditional signature-based definitions are available Read moreq Product Description NORTON INTERNET SECURITY 2008 CD SOP 10U UNSPSC CodeUNSPSC Code : 43233203 Product IDUPC: 037648610056Manufacturer Part: 12608440 Read more Product Description Stay protected from the latest online threats. Norton Internet Security 2008 runs quietly in the background to detect and block today's complex threats and to protect your identity when you buy, bank, or browse online. The friendly and efficient product design helps minimize confusing security alerts and system slowdowns that can get in the way of your online experience. And if you need help, an integrated online chat tool connects you to our support professionals, so you have easy access to the answers you need. In addition to protection updates, Norton Internet Security provides new product features as available throughout your service subscription.
  • 2. Norton Internet Security 2008 runs quietly in the background to detect and block today's complex threats and to protect your identity when you buy, bank, or browse online. Stay protected from the latest online threats. Norton Internet Security 2008 runs quietly in the background to detect and block today's complex threats and to protect your identity when you buy, bank, or browse online. Key Benefits Blocks online identity theft--An extra layer of security protects when you buy, bank, or browse. Detects and eliminates spyware--Provides advanced protection against today's latest threats. Removes viruses and Internet worms--Fast and quiet scans provide comprehensive, automatic protection. Protects against hackers--Safeguards your computer with a smart firewall that automatically configures protection settings. Includes Full Versions of the Following Products: Norton AntiVirus Norton Personal Firewall Norton Antispyware Norton Identity Safe--New! Norton Antiphishing New Features and Enhancements--What's New Norton Identity Safe keeps your personal information and your identity safe when you buy, bank and browse online. Enhanced performance lets you start, scan, and run faster, so you can enjoy your online experience. Get help fast with free online technical support via live chat and email all from within the product. Optimized product design improves scan times and decreases impact on system startup and resource usage. SONAR (Symantec Online Network for Advanced Response) technology delivers behavior-based protection that can detect emerging spyware and viruses even before traditional signature-based definitions are available. Stores and encrypts your passwords and other confidential data, automatically filling it at your request to save time and protect it from being stolen by eavesdropping keystroke loggers. Network security monitoring checks the status of your wireless network security, maps connected devices, and provides expert advice on managing your network security settings.
  • 3. Start, scan, and run faster. Improved performance delivers an enhanced online experience. Norton AntiVirus: Antivirus and antispyware protection, rootkit detection and intrusion protection Protects your computer by automatically detecting and removing spyware, viruses, Trojan horses, and Internet worms. Exchange files via email and instant messaging without worrying about receiving threats on your computer or spreading them to others. Stays out of your way. Runs quietly in the background without requiring you to respond to confusing security alerts. Threat blocking technology quietly monitors system activities to stop most spyware, viruses, and worms before they can install and cause damage on your system. Email and instant message scanning detects and removes infected attachments even if they're hidden in archives. Rootkit detection finds and removes threats that are hidden deeply in the operating system. Internet worm protection blocks an entire class of viruses, spyware, and worms with a single threat signature. Thorough pre-installation scan cleans out spyware and virus infections that can obstruct ordinary protection. Quick Scan automatically runs on receipt of new definitions to help ensure protection against the latest threats. Full System Scan performs a deep scan of the system and hard drive to remove existing spyware, viruses, and other threats. Norton Identity Safe: Antiphishing, Web site authentication, eavesdropping protection and confidential information management Advanced phishing protection identifies and blocks fraudulent Web sites designed to steal personal information. Adds a layer of targeted, real-time identity theft protection to prevent identity thieves from eavesdropping on your online shopping transactions and banking and brokerage sessions from login to logout. Blocks hard-to-detect phishing sites by deeply analyzing Web page elements for evidence of criminal activity. Authenticates the Web location and credentials of the most popular banking and shopping sites, so you know you're dealing with the true site and not a fake. Norton Personal Firewall: Two-way firewall Stay hidden when connected with a smart firewall that automatically configures protection settings. Log on at home, at a cafe, or on the road, and Norton Internet Security automatically optimizes your security settings. Two-way firewall blocks hackers from breaking into your computer and stops spyware from transmitting information. Trust Control automatically optimizes your protection settings based on the network--wired or wireless, public or private--to which you're connected.
  • 4. Additional Features The Norton Add-on Pack delivers optional solutions for you and your family including antispam and parental controls. Connect with confidence knowing your protection is continuously updated for one year as new threats emerge. Includes protection updates and new product features as available throughout the renewable service period. Intrusion prevention shields newly discovered security holes in the operating system and applications to prevent viruses, worms, and hackers from entering through these vulnerabilities. Includes one year of automatic definition updates, new product features, and access to updated versions of Norton Internet Security throughout the life of your service subscription. Read more