SlideShare una empresa de Scribd logo
1 de 74
Descargar para leer sin conexión
Outpost PRO
    Proactive PC Security Since 2002




Performance Edition 7.5
    Extended Tour
        Released June 15, 2011


            www.Agnitum.com
Outpost PRO 7.5
 with Personal Virus Adviser




   PROACTIVE APPROACH
Contents:
1. About Outpost Pro
2. Functionality
3. Version 7.5 – What’s New
4. How Outpost Secures PC
5. What’s Inside (extended!):
     A. Anti-Malware (full)
     B. Proactive Protection (full)
     C. Personal Firewall (full)
     D. Web Surfing Security (full)
     E. Anti-Spam
6. Specifications
7. Why Outpost Pro?
8. Licensing policy
        www.Outpost.Pro
About Outpost Pro



     www.Outpost.Pro
Outpost PRO is:
1. MALWARE FIGHTER

  2. CONNECTION PROTECTOR

     3. UNWANTED CONTENT FILTER

        4. WEB SURFING PRIVACY KEEPER

           5. PRIVATE DATA LOCKER

             6. JUNK MAIL PREVENTER

                7. ADVANCED ANALYSIS TOOLKIT

                  www.Outpost.Pro
Outpost PRO
     Proactive PC Security since 2002




   Outpost Firewall Pro
  Outpost Antivirus Pro
Outpost Security Suite Pro
Functionality



   www.Outpost.Pro
Outpost Antivirus Pro 7.5 –
       Security for non-expert PC users




Anti-virus + anti-spyware efficiently stops and removes malware from your PC.
Outpost Firewall Pro 7.5 – protection against
  cyber attacks, spyware, and new threats




 Leading PC firewall with antispyware, proactive defense and secure browsing
Outpost Security Suite Pro 7.5 – all-in-one
        Proactive Internet security
Outpost key functionality
1. Known malware/spyware detection/deactivation/clean-up

2. New/unknown malware and spyware blocking

3. Network connections security

4. Web surfing/web privacy control

5. Personal data access protection

6. Mail protection and filtering

7. Sophisticated analysis tools – and more!

                       www.Outpost.Pro
Outpost Pro components
• Anti-Malware (Anti-Virus + Anti-Spyware)

• Personal Firewall:
      • Application Firewall + Attack Detection + IP BlockList

• Proactive Protection:
      • Anti-Leak + System Guard + Application Guard
      • File & Folder Lock + Removable Media Protection

• Web surfing Control:
      • Ad and content block + URL blacklist + ID Block

• Anti-Spam

                     www.Outpost.Pro
Outpost Pro extensions
• ImproveNet technology
       (cloud-based system to provide secure configurations)

• SmartScan technology
       (optimization for fast subsequent malware scans)

• SmartDecision technology (NEW!):
       (Personal Virus Adviser for smart security decision-making)

• Analysis tools:
       • File and Registry Activity monitor
       conceptually similar to Mark Russinovich’s SysMon and RegMon
       • Event Viewer (detailed activity logs)


                        www.Outpost.Pro
Products comparison




      www.Outpost.Pro
Version 7.5 –
What’s New



   www.Outpost.Pro
Outpost 7.5 – What’s New?




         www.Outpost.Pro
Outpost 7.5. What’s New?


SmartDecision technology – “Personal Virus Adviser”
5 levels for starting files/processes with ratings andvisual alerts

Proactive clipboard and screen content protection

Customizable USB/CD/DVD storage vulnerability protection
5 levels of customization for manual block/unblock autorun

Anti-Malware – PDF filtering

Proactive Protection – color-coded alerts and other options

                       www.Outpost.Pro
Outpost 7.5 What’s Improved?

 3x faster web content filtering

 Up to 2.5x faster on-access and on-demand scanning

 Updated anti-malware engine and detection rate

 SmartScan generation 4 – 3-5x faster subsequent malware scans

 More secure auto-learn function for infected systems

 Full firewall compatibility with mobile broadband devices

 Security for 64-bit platforms
                       www.Outpost.Pro
How Outpost
secures your PC



    www.Outpost.Pro
Outpost 7.5 - How It Works




 Learn more at http://goo.gl/fcunw How Outpost 7.5 secures your PC
                         www.Outpost.Pro
What’s Inside



   www.Outpost.Pro
What’s Inside:
a. Anti-Malware



    www.Outpost.Pro
Outpost Pro Anti-Malware




       www.Outpost.Pro
Anti-Malware
Combined Anti-Virus + Anti-Spyware
  for fixed, network and removable drives, mail and web content:
        On-access monitor
        On-demand scanner
        Mail attachment filter
        Malware quarantine
        Simple repair/disinfection
        Scans web pages/mail/
          news feeds




                         www.Outpost.Pro
Anti-Malware in detail
Combined Anti-Virus + Anti-Spyware

Additional technologies:
 Heuristic Analysis
(normal/in-depth)
 eXtended Heuristic Analyzer
(HAX, integrated with SmartDecision)
 SmartScan 4 technology
(optimized time for repeat scans)
 “SPE Analysis” (anti-malware
integration with SmartDecision)




                         www.Outpost.Pro
Anti-Malware in detail
Scanning profiles:
   Pre-defined (low/normal priority)
   Customized/manual profiles




                         www.Outpost.Pro
Anti-Malware: Drives
Scanning options:
   Actions: List/Repair/Remove/
   Exclusions and limitations
  (extension/size/paths/object type)
   Special settings for embedded
     OLE objects and archives




                          www.Outpost.Pro
Anti-Malware: Mail & Web
 Mail scanner (2-way/1-way)
 Mail attachment filter
 Embedded web malware blocking




                       www.Outpost.Pro
Anti-Malware: Quarantine




Alternative suspicious file/web link/false
positive submission method:
http://www.agnitum.com/support/submit_files.php



                                  www.Outpost.Pro
Anti-Malware: Event logs




       www.Outpost.Pro
What’s Inside:
b. Proactive Protection



        www.Outpost.Pro
Outpost’s Proactive Approach
PROACTIVE PROTECTION IS THE KEY:
   Tracks OS and application behavior

   Prevents hijacking of your OS

   Prevents hijacking and misuse of your applications

   Protects passwords and IDs used in OS/applications

   Hides your valuable data in designated files and folders

   Prevents your data from leaking or being stolen

   Lets you manage additional system settings (like autorun)
                      www.Outpost.Pro
PROACTIVE APPROACH
1. OS integrity + applications control
  • System Guard Improved!
     prevents your system from being hijacked – unauthorized applications
        cannot “touch” your OS. Secures critical system files + configurations
        (system registry settings) against misuse or compromise.

  • Anti-Leak control (stops new threats activation) Improved!
    prevents your OS from being infected by unknown threats

  • Self Defense Improved!
    Outpost protection cannot be terminated by malicious code

  • Removable Media Protection NEW!
    5-level management for auto-run applications from CD/DVD/USB storage
                            www.Outpost.Pro
PROACTIVE APPROACH
2. Smart Decision, “Personal Virus Adviser”,
5-level rating for the starting files/processes




                 www.Outpost.Pro
PROACTIVE APPROACH
3. Privacy and analysis tools:
  • Application Guard Improved!
    prevents sensitive data (IDs, logins, passwords, account numbers) stored
    by Internet-enabled applications such as IM (instant messaging), web
    browsers, e-mail clients and e-banking software from being compromised.

  • File and Folder Lock
    protects locally-stored assets from corruption, modification, or illegal
    access by other users or malware.

  • Real-time File and Registry Activity Monitoring
    lets you examine system events at close range by monitoring activity
    of any given active process and tracking system changes in real time.

                           www.Outpost.Pro
Proactive System Protection




  System Protection:
 Anti-Leak
Component Control
System Guard

                www.Outpost.Pro
Proactive Application Control
Data Theft Prevention:
Anti-Leak
Application Guard
USB/CD/DVD storage block




                   www.Outpost.Pro
Proactive Data Privacy
Theft/Corruption Prevention and Privacy:
File and Folder Lock to protect selected locations




                       www.Outpost.Pro
Proactive Task Management




     Additional analysis/management tool:
      Process activity monitor (Outpost’s Task Manager)



              www.Outpost.Pro
Proactive Analysis Toolkit


                          File and
                          Registry
                          Activity
                          Monitor
                          (similar to
                          RegMon/
                          /FileMon)




        www.Outpost.Pro
Easy Proactive Protection
Smart Decision – “Personal Virus Adviser” 5-level
rating (trusted/good, moderate, suspicious/untrusted)




                     www.Outpost.Pro
Easy Proactive Protection
Smart Decision – “Personal Virus Adviser” 5-level
rating (trusted/good, moderate/suspicious, untrusted)




                     www.Outpost.Pro
Easy Proactive Protection
Smart Decision – “Personal Virus Adviser” 5-level
rating (trusted/good, moderate/suspicious, untrusted)




                     www.Outpost.Pro
Easy Proactive Protection
ImproveNet system for safe configuration auto-creation




      Auto-Learn to remember
      user’s typical activity
      to decrease interaction
      after training period


                     www.Outpost.Pro
c. Personal Firewall




      www.Outpost.Pro
What’s Inside. Firewall




 Network access rules for
every present application




                    www.Outpost.Pro
What’s Inside - Firewall




       www.Outpost.Pro
What’s Inside - Firewall

                                     Local Area Network
                                    security rules




All domains supported and
auto-resolved




                        www.Outpost.Pro
What’s Inside - Firewall




         Attack Detection:
          Blocking intrusion attempts
          Customizable lists for hosts &
            vulnerable/malware ports


       www.Outpost.Pro
What’s Inside - Firewall




IP BlockList:
 Manual (add IP range by domain)
 Importable/Exportable lists




                          www.Outpost.Pro
d. Web Surfing Security
     and Control



        www.Outpost.Pro
What’s Inside - Web Control




        www.Outpost.Pro
What’s Inside - Web Control
                To secure websites surfing, e-mail and
                   news feeds:
                 Ad blocking (by size/name/format)
                 Active web page elements filter
                 Automated/manual URL “black lists”
                 “Stop words” web filter
                 Web script scanner




        www.Outpost.Pro
What’s Inside - Web Control
                ID Block:
                 To block ID (passwords, credit card
                  numbers. etc.) transfer via HTTP.
                 Exclude your trusted sites and
                  secure protocols (HTTPS/SSL).




        www.Outpost.Pro
e. Anti-Spam




  www.Outpost.Pro
What’s Inside - Anti-Spam




 Outlook/Outlook Express/The BAT!/Vista Mail/Windows 7 Mail plug-in
 Training wizard, white and black lists, filtering levels
                         www.Outpost.Pro
Specifications




   www.Outpost.Pro
Outpost 7.5 Specifications




         www.Outpost.Pro
Outpost 7.5 Compatibility
   Full-range supported Windows platforms:
   – regular 32-bit and 64-bit Windows:
             Windows 7 (including SP1),
             Vista (including SP1 and SP2),
             Windows XP (SP2 and higher),
   + Windows Server editions (both 32-bit and 64-bit):
             Windows Server 2003 (SP1 and higher),
             Windows Server 2008 (including 2008 R2).

   Supported email clients for anti-spam:
           The Bat!, Windows Mail,
           Outlook Express, Outlook (all versions).

   Supported email protocols & services: POP3, SMTP, IMAP.

   Compatibility mode for some 3-rd party anti-virus tools.


                   www.Outpost.Pro
Outpost 7.5 PC Requirements
               Minimal hardware requirements
                         x86-/x64-/multi-core CPU,
    Starting from 450 MHz (Intel/AMD-compatible) and 256 MB RAM.
                   Miminum 350MB free hard disk space
   (for Antivirus and Security Suite, Firewall – 200 MB hard disk space).




                        www.Outpost.Pro
Why Outpost Pro?



     www.Outpost.Pro
Why Outpost Pro
 Works for both beginning and advanced users
• Personal Virus Adviser – SmartDecision
       visual recommendations with corresponding color security alerts

• ImproveNet – cloud-based system since 2006
     Outpost user community and Agnitum collaborate to deliver and
     auto-apply verified firewall/proactive protection configurations

• Easy to install and use:
    Simple and Expert modes (configuration and main window views)
    Auto-Learn (self-learn) mode to remember user’s behavior
    Entertainment (for games & video) mode

                          www.Outpost.Pro
Why Outpost Pro
I. Malware protection and performance
a. Certified malware detection and blocking
    Top industry malware blocking (PCMag test, July 2011) via
     PCMag.com http://goo.gl/CN2Jm

    8 Virus Bulletin awards in-a-row on all current Windows OS via
     VirusBtn.com http://goo.gl/cWZci




    WinXP    2008 R2   Vista SP2   2003 SP2   Win7   WinXP   2008 R2

                             www.Outpost.Pro
Why Outpost Pro
I. Malware protection and performance
b. High-speed scanning and low resource consumption

   3 Gold Awards in Antivirus Performance Tests in 2011:
     outperforms industry average antivirus by 84%
     via Anti-Malware-Test.com http://goo.gl/E9iMA




                        www.Outpost.Pro
Why Outpost Pro
II. Proactive Protection and Self-Protection
a. Preemptive blocking of new/unknown malware

   7 “Excellent!” awards in Proactive Security Challenge (scored
    89-99%) since 2008 via Matousec.com http://goo.gl/iMgcY




                        www.Outpost.Pro
Why Outpost Pro
II. Proactive Protection and Self-Protection
b. Protection that is always ON:
    Excellent self-protection against targeted protection deactivation
     via Anti-Malware-Test.org http://goo.gl/SWcq2 (32-bit) and
     http://goo.gl/J7fTb (64-bit), WinXP and W7 tests since 2010




                          www.Outpost.Pro
Licensing Policy




    www.Outpost.Pro
Licensing Policy
            Active license covers:

         Lifetime right to use software,

  free priority updates for software services,

free technical support (email, web, online chat),

   free upgrade to major and minor releases.




                www.Outpost.Pro
Prices for home users
                 Single license
                 (1 PC, any OS)



                Starting      Starting    Starting
               at $29.95     at $29.95   at $19.95
               For 3 PCs      For 1 PC    For 1 PC
                           Also available:

Personal Pack (3 PC at 1 home), Family Pack (up to 5 home PCs)

                     www.Outpost.Pro
Prices for organizations
             Business license
                      per 1 PC



               Starting      Starting    Starting
              at $29.95     at $49.95   at $39.95

                          Also available:

Volume discount prices (1-4, 5-9, 10- 25 PCs, etc.) on request

                    www.Outpost.Pro
Prices for organizations
                  Educational license
                              per 1 PC



         For educational, academic and non-commercial institutions

              (discounts = 30 % OFF the business license price)


Also available: Volume discount prices (1-4, 5-9, 10- 25 PCs, etc.) on request

                            www.Outpost.Pro
Discounts
                RENEWAL
                Discounts



          40% OFF    40% OFF    50% OFF

Also available: Lifetime support and upgrade license

      (only for Firewall for personal/home use)

                www.Outpost.Pro
Discounts
         MIGRATION discounts


OR => 40% OFF                            PLUS => FREE




                       Also available:

           Single License -> Personal Pack upgrade

           Personal Pack -> Family License upgrade

                     www.Outpost.Pro
www.Agnitum.com




Thank you for your time!
Visit www.Agnitum.com now
  and download your free
 full-function 30-day copy!

         www.Outpost.Pro

Más contenido relacionado

La actualidad más candente

COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMfaraz hussain
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System ThreatsReddhi Basu
 
OWASP zabezpieczenia aplikacji - Top 10 ASR
OWASP zabezpieczenia aplikacji - Top 10 ASROWASP zabezpieczenia aplikacji - Top 10 ASR
OWASP zabezpieczenia aplikacji - Top 10 ASRLaravel Poland MeetUp
 
Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportAjit Gaddam
 
My Null Android Penetration Session
My Null  Android Penetration Session My Null  Android Penetration Session
My Null Android Penetration Session Avinash Sinha
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5AfiqEfendy Zaen
 
Web Application Penetration Testing Introduction
Web Application Penetration Testing IntroductionWeb Application Penetration Testing Introduction
Web Application Penetration Testing Introductiongbud7
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a Google
 
Application Explosion How to Manage Productivity vs Security
Application Explosion How to Manage Productivity vs SecurityApplication Explosion How to Manage Productivity vs Security
Application Explosion How to Manage Productivity vs SecurityLumension
 
Integrated Tools in OSSIM
Integrated Tools in OSSIMIntegrated Tools in OSSIM
Integrated Tools in OSSIMAlienVault
 
Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS Brent Muir
 
OS Database Security Chapter 6
OS Database Security Chapter 6OS Database Security Chapter 6
OS Database Security Chapter 6AfiqEfendy Zaen
 
Automated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactAutomated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactTom Eston
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch Pruthvi Monarch
 

La actualidad más candente (20)

COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
 
OWASP zabezpieczenia aplikacji - Top 10 ASR
OWASP zabezpieczenia aplikacji - Top 10 ASROWASP zabezpieczenia aplikacji - Top 10 ASR
OWASP zabezpieczenia aplikacji - Top 10 ASR
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability report
 
Chapter 2 program-security
Chapter 2 program-securityChapter 2 program-security
Chapter 2 program-security
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
 
My Null Android Penetration Session
My Null  Android Penetration Session My Null  Android Penetration Session
My Null Android Penetration Session
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Pentesting Android Apps
Pentesting Android AppsPentesting Android Apps
Pentesting Android Apps
 
Web Application Penetration Testing Introduction
Web Application Penetration Testing IntroductionWeb Application Penetration Testing Introduction
Web Application Penetration Testing Introduction
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a
 
Application Explosion How to Manage Productivity vs Security
Application Explosion How to Manage Productivity vs SecurityApplication Explosion How to Manage Productivity vs Security
Application Explosion How to Manage Productivity vs Security
 
Integrated Tools in OSSIM
Integrated Tools in OSSIMIntegrated Tools in OSSIM
Integrated Tools in OSSIM
 
Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS
 
OS Database Security Chapter 6
OS Database Security Chapter 6OS Database Security Chapter 6
OS Database Security Chapter 6
 
It kamus virus security glossary
It kamus virus   security glossaryIt kamus virus   security glossary
It kamus virus security glossary
 
Automated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactAutomated Penetration Testing With Core Impact
Automated Penetration Testing With Core Impact
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 

Destacado

Colors of Paradise.
Colors of Paradise.Colors of Paradise.
Colors of Paradise.Cachi Chien
 
The Little Baker
The Little BakerThe Little Baker
The Little BakerCachi Chien
 
Gregorian Chants
Gregorian ChantsGregorian Chants
Gregorian ChantsCachi Chien
 
31 η ανάκτηση της πόλης από τον μιχ. παλαιολόγο
31 η ανάκτηση της πόλης από τον μιχ. παλαιολόγο31 η ανάκτηση της πόλης από τον μιχ. παλαιολόγο
31 η ανάκτηση της πόλης από τον μιχ. παλαιολόγοgeorge papadopoulos
 
Ants. Illustrations by Andrey Pavlov
Ants. Illustrations by Andrey PavlovAnts. Illustrations by Andrey Pavlov
Ants. Illustrations by Andrey PavlovCachi Chien
 
The variety of food
The variety of foodThe variety of food
The variety of foodlmatejada
 
Family Franchising Systems(Revised) #1
Family Franchising Systems(Revised) #1Family Franchising Systems(Revised) #1
Family Franchising Systems(Revised) #1Terrell Patillo
 
My Ebony Bride Vendor Presentation
My Ebony Bride Vendor PresentationMy Ebony Bride Vendor Presentation
My Ebony Bride Vendor PresentationGiovanna410
 
Supply of water resources by Muhammad Fahad Ansari 12IEEM14
Supply of water resources by Muhammad Fahad Ansari 12IEEM14Supply of water resources by Muhammad Fahad Ansari 12IEEM14
Supply of water resources by Muhammad Fahad Ansari 12IEEM14fahadansari131
 
The periodic table by Muhammad Fahad Ansari 12IEEM14
The periodic table by Muhammad Fahad Ansari 12IEEM14 The periodic table by Muhammad Fahad Ansari 12IEEM14
The periodic table by Muhammad Fahad Ansari 12IEEM14 fahadansari131
 
Glasswing Butterfly
Glasswing ButterflyGlasswing Butterfly
Glasswing ButterflyCachi Chien
 
Presentation skills + study skills
Presentation skills + study skillsPresentation skills + study skills
Presentation skills + study skillsSundaresh Kn
 
Album Cover and Magazine Adverts for Album Release Analysis
Album Cover and Magazine Adverts for Album Release AnalysisAlbum Cover and Magazine Adverts for Album Release Analysis
Album Cover and Magazine Adverts for Album Release Analysislelicordell
 
Christie reed cowes high school 2010
Christie reed  cowes high school 2010Christie reed  cowes high school 2010
Christie reed cowes high school 2010christie94
 
Memories (Charles Peterson)
Memories (Charles Peterson)Memories (Charles Peterson)
Memories (Charles Peterson)Cachi Chien
 
Open House Wapping Elementary School
Open House Wapping Elementary School Open House Wapping Elementary School
Open House Wapping Elementary School Shari Stein Jackson
 

Destacado (20)

Colors of Paradise.
Colors of Paradise.Colors of Paradise.
Colors of Paradise.
 
Ddасгал
DdасгалDdасгал
Ddасгал
 
The Little Baker
The Little BakerThe Little Baker
The Little Baker
 
Gregorian Chants
Gregorian ChantsGregorian Chants
Gregorian Chants
 
Service quality
Service qualityService quality
Service quality
 
31 η ανάκτηση της πόλης από τον μιχ. παλαιολόγο
31 η ανάκτηση της πόλης από τον μιχ. παλαιολόγο31 η ανάκτηση της πόλης από τον μιχ. παλαιολόγο
31 η ανάκτηση της πόλης από τον μιχ. παλαιολόγο
 
Git hacking
Git hackingGit hacking
Git hacking
 
Ants. Illustrations by Andrey Pavlov
Ants. Illustrations by Andrey PavlovAnts. Illustrations by Andrey Pavlov
Ants. Illustrations by Andrey Pavlov
 
The variety of food
The variety of foodThe variety of food
The variety of food
 
Family Franchising Systems(Revised) #1
Family Franchising Systems(Revised) #1Family Franchising Systems(Revised) #1
Family Franchising Systems(Revised) #1
 
My Ebony Bride Vendor Presentation
My Ebony Bride Vendor PresentationMy Ebony Bride Vendor Presentation
My Ebony Bride Vendor Presentation
 
Patillo family scan
Patillo family scanPatillo family scan
Patillo family scan
 
Supply of water resources by Muhammad Fahad Ansari 12IEEM14
Supply of water resources by Muhammad Fahad Ansari 12IEEM14Supply of water resources by Muhammad Fahad Ansari 12IEEM14
Supply of water resources by Muhammad Fahad Ansari 12IEEM14
 
The periodic table by Muhammad Fahad Ansari 12IEEM14
The periodic table by Muhammad Fahad Ansari 12IEEM14 The periodic table by Muhammad Fahad Ansari 12IEEM14
The periodic table by Muhammad Fahad Ansari 12IEEM14
 
Glasswing Butterfly
Glasswing ButterflyGlasswing Butterfly
Glasswing Butterfly
 
Presentation skills + study skills
Presentation skills + study skillsPresentation skills + study skills
Presentation skills + study skills
 
Album Cover and Magazine Adverts for Album Release Analysis
Album Cover and Magazine Adverts for Album Release AnalysisAlbum Cover and Magazine Adverts for Album Release Analysis
Album Cover and Magazine Adverts for Album Release Analysis
 
Christie reed cowes high school 2010
Christie reed  cowes high school 2010Christie reed  cowes high school 2010
Christie reed cowes high school 2010
 
Memories (Charles Peterson)
Memories (Charles Peterson)Memories (Charles Peterson)
Memories (Charles Peterson)
 
Open House Wapping Elementary School
Open House Wapping Elementary School Open House Wapping Elementary School
Open House Wapping Elementary School
 

Similar a Outpost Security Pro 7.5 - Extended Tour

Agnitum Outpost Pro product line
Agnitum Outpost Pro product lineAgnitum Outpost Pro product line
Agnitum Outpost Pro product linePavel Fyodorov
 
Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010nuttakorn nakkerd
 
unistal in-Protegent Security - Home Business 1
unistal in-Protegent Security - Home  Business 1unistal in-Protegent Security - Home  Business 1
unistal in-Protegent Security - Home Business 1Vijay Kumar
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentationsdrayin
 
5 howtomitigate
5 howtomitigate5 howtomitigate
5 howtomitigatericharddxd
 
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017Jermund Ottermo
 
Antivirus Comparative junio 2014
Antivirus Comparative junio 2014Antivirus Comparative junio 2014
Antivirus Comparative junio 2014Doryan Mathos
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirusShabnam Bashir
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chanceDr. Anish Cheriyan (PhD)
 
Venkasure Antivirus Pro
Venkasure Antivirus ProVenkasure Antivirus Pro
Venkasure Antivirus Prorobinshaif
 
Super Easy Memory Forensics
Super Easy Memory ForensicsSuper Easy Memory Forensics
Super Easy Memory ForensicsIIJ
 
100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdfMAHESHUMANATHGOPALAK
 
SOC-BlueTEam.pdf
SOC-BlueTEam.pdfSOC-BlueTEam.pdf
SOC-BlueTEam.pdfBeratAkit
 

Similar a Outpost Security Pro 7.5 - Extended Tour (20)

Agnitum Outpost Pro product line
Agnitum Outpost Pro product lineAgnitum Outpost Pro product line
Agnitum Outpost Pro product line
 
Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010
 
unistal in-Protegent Security - Home Business 1
unistal in-Protegent Security - Home  Business 1unistal in-Protegent Security - Home  Business 1
unistal in-Protegent Security - Home Business 1
 
Avc prot 2012b_en
Avc prot 2012b_enAvc prot 2012b_en
Avc prot 2012b_en
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentation
 
5 howtomitigate
5 howtomitigate5 howtomitigate
5 howtomitigate
 
Top 10 antiviruses
Top 10 antivirusesTop 10 antiviruses
Top 10 antiviruses
 
Avc prot 2016a_en
Avc prot 2016a_enAvc prot 2016a_en
Avc prot 2016a_en
 
Avc prot 2013a_en
Avc prot 2013a_enAvc prot 2013a_en
Avc prot 2013a_en
 
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
 
Antivirus Comparative junio 2014
Antivirus Comparative junio 2014Antivirus Comparative junio 2014
Antivirus Comparative junio 2014
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Fortinet av
Fortinet avFortinet av
Fortinet av
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
 
Performance dec 2010
Performance dec 2010Performance dec 2010
Performance dec 2010
 
Venkasure Antivirus Pro
Venkasure Antivirus ProVenkasure Antivirus Pro
Venkasure Antivirus Pro
 
Super Easy Memory Forensics
Super Easy Memory ForensicsSuper Easy Memory Forensics
Super Easy Memory Forensics
 
100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf
 
SOC-BlueTEam.pdf
SOC-BlueTEam.pdfSOC-BlueTEam.pdf
SOC-BlueTEam.pdf
 
100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf
 

Último

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Último (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

Outpost Security Pro 7.5 - Extended Tour

  • 1. Outpost PRO Proactive PC Security Since 2002 Performance Edition 7.5 Extended Tour Released June 15, 2011 www.Agnitum.com
  • 2. Outpost PRO 7.5 with Personal Virus Adviser PROACTIVE APPROACH
  • 3. Contents: 1. About Outpost Pro 2. Functionality 3. Version 7.5 – What’s New 4. How Outpost Secures PC 5. What’s Inside (extended!): A. Anti-Malware (full) B. Proactive Protection (full) C. Personal Firewall (full) D. Web Surfing Security (full) E. Anti-Spam 6. Specifications 7. Why Outpost Pro? 8. Licensing policy www.Outpost.Pro
  • 4. About Outpost Pro www.Outpost.Pro
  • 5. Outpost PRO is: 1. MALWARE FIGHTER 2. CONNECTION PROTECTOR 3. UNWANTED CONTENT FILTER 4. WEB SURFING PRIVACY KEEPER 5. PRIVATE DATA LOCKER 6. JUNK MAIL PREVENTER 7. ADVANCED ANALYSIS TOOLKIT www.Outpost.Pro
  • 6. Outpost PRO Proactive PC Security since 2002 Outpost Firewall Pro Outpost Antivirus Pro Outpost Security Suite Pro
  • 7. Functionality www.Outpost.Pro
  • 8. Outpost Antivirus Pro 7.5 – Security for non-expert PC users Anti-virus + anti-spyware efficiently stops and removes malware from your PC.
  • 9. Outpost Firewall Pro 7.5 – protection against cyber attacks, spyware, and new threats Leading PC firewall with antispyware, proactive defense and secure browsing
  • 10. Outpost Security Suite Pro 7.5 – all-in-one Proactive Internet security
  • 11. Outpost key functionality 1. Known malware/spyware detection/deactivation/clean-up 2. New/unknown malware and spyware blocking 3. Network connections security 4. Web surfing/web privacy control 5. Personal data access protection 6. Mail protection and filtering 7. Sophisticated analysis tools – and more! www.Outpost.Pro
  • 12. Outpost Pro components • Anti-Malware (Anti-Virus + Anti-Spyware) • Personal Firewall: • Application Firewall + Attack Detection + IP BlockList • Proactive Protection: • Anti-Leak + System Guard + Application Guard • File & Folder Lock + Removable Media Protection • Web surfing Control: • Ad and content block + URL blacklist + ID Block • Anti-Spam www.Outpost.Pro
  • 13. Outpost Pro extensions • ImproveNet technology (cloud-based system to provide secure configurations) • SmartScan technology (optimization for fast subsequent malware scans) • SmartDecision technology (NEW!): (Personal Virus Adviser for smart security decision-making) • Analysis tools: • File and Registry Activity monitor conceptually similar to Mark Russinovich’s SysMon and RegMon • Event Viewer (detailed activity logs) www.Outpost.Pro
  • 14. Products comparison www.Outpost.Pro
  • 15. Version 7.5 – What’s New www.Outpost.Pro
  • 16. Outpost 7.5 – What’s New? www.Outpost.Pro
  • 17. Outpost 7.5. What’s New? SmartDecision technology – “Personal Virus Adviser” 5 levels for starting files/processes with ratings andvisual alerts Proactive clipboard and screen content protection Customizable USB/CD/DVD storage vulnerability protection 5 levels of customization for manual block/unblock autorun Anti-Malware – PDF filtering Proactive Protection – color-coded alerts and other options www.Outpost.Pro
  • 18. Outpost 7.5 What’s Improved? 3x faster web content filtering Up to 2.5x faster on-access and on-demand scanning Updated anti-malware engine and detection rate SmartScan generation 4 – 3-5x faster subsequent malware scans More secure auto-learn function for infected systems Full firewall compatibility with mobile broadband devices Security for 64-bit platforms www.Outpost.Pro
  • 19. How Outpost secures your PC www.Outpost.Pro
  • 20. Outpost 7.5 - How It Works Learn more at http://goo.gl/fcunw How Outpost 7.5 secures your PC www.Outpost.Pro
  • 21. What’s Inside www.Outpost.Pro
  • 23. Outpost Pro Anti-Malware www.Outpost.Pro
  • 24. Anti-Malware Combined Anti-Virus + Anti-Spyware for fixed, network and removable drives, mail and web content:  On-access monitor  On-demand scanner  Mail attachment filter  Malware quarantine  Simple repair/disinfection  Scans web pages/mail/ news feeds www.Outpost.Pro
  • 25. Anti-Malware in detail Combined Anti-Virus + Anti-Spyware Additional technologies:  Heuristic Analysis (normal/in-depth)  eXtended Heuristic Analyzer (HAX, integrated with SmartDecision)  SmartScan 4 technology (optimized time for repeat scans)  “SPE Analysis” (anti-malware integration with SmartDecision) www.Outpost.Pro
  • 26. Anti-Malware in detail Scanning profiles:  Pre-defined (low/normal priority)  Customized/manual profiles www.Outpost.Pro
  • 27. Anti-Malware: Drives Scanning options:  Actions: List/Repair/Remove/  Exclusions and limitations (extension/size/paths/object type)  Special settings for embedded OLE objects and archives www.Outpost.Pro
  • 28. Anti-Malware: Mail & Web  Mail scanner (2-way/1-way)  Mail attachment filter  Embedded web malware blocking www.Outpost.Pro
  • 29. Anti-Malware: Quarantine Alternative suspicious file/web link/false positive submission method: http://www.agnitum.com/support/submit_files.php www.Outpost.Pro
  • 30. Anti-Malware: Event logs www.Outpost.Pro
  • 31. What’s Inside: b. Proactive Protection www.Outpost.Pro
  • 32. Outpost’s Proactive Approach PROACTIVE PROTECTION IS THE KEY:  Tracks OS and application behavior  Prevents hijacking of your OS  Prevents hijacking and misuse of your applications  Protects passwords and IDs used in OS/applications  Hides your valuable data in designated files and folders  Prevents your data from leaking or being stolen  Lets you manage additional system settings (like autorun) www.Outpost.Pro
  • 33. PROACTIVE APPROACH 1. OS integrity + applications control • System Guard Improved! prevents your system from being hijacked – unauthorized applications cannot “touch” your OS. Secures critical system files + configurations (system registry settings) against misuse or compromise. • Anti-Leak control (stops new threats activation) Improved! prevents your OS from being infected by unknown threats • Self Defense Improved! Outpost protection cannot be terminated by malicious code • Removable Media Protection NEW! 5-level management for auto-run applications from CD/DVD/USB storage www.Outpost.Pro
  • 34. PROACTIVE APPROACH 2. Smart Decision, “Personal Virus Adviser”, 5-level rating for the starting files/processes www.Outpost.Pro
  • 35. PROACTIVE APPROACH 3. Privacy and analysis tools: • Application Guard Improved! prevents sensitive data (IDs, logins, passwords, account numbers) stored by Internet-enabled applications such as IM (instant messaging), web browsers, e-mail clients and e-banking software from being compromised. • File and Folder Lock protects locally-stored assets from corruption, modification, or illegal access by other users or malware. • Real-time File and Registry Activity Monitoring lets you examine system events at close range by monitoring activity of any given active process and tracking system changes in real time. www.Outpost.Pro
  • 36. Proactive System Protection System Protection:  Anti-Leak Component Control System Guard www.Outpost.Pro
  • 37. Proactive Application Control Data Theft Prevention: Anti-Leak Application Guard USB/CD/DVD storage block www.Outpost.Pro
  • 38. Proactive Data Privacy Theft/Corruption Prevention and Privacy: File and Folder Lock to protect selected locations www.Outpost.Pro
  • 39. Proactive Task Management Additional analysis/management tool:  Process activity monitor (Outpost’s Task Manager) www.Outpost.Pro
  • 40. Proactive Analysis Toolkit File and Registry Activity Monitor (similar to RegMon/ /FileMon) www.Outpost.Pro
  • 41. Easy Proactive Protection Smart Decision – “Personal Virus Adviser” 5-level rating (trusted/good, moderate, suspicious/untrusted) www.Outpost.Pro
  • 42. Easy Proactive Protection Smart Decision – “Personal Virus Adviser” 5-level rating (trusted/good, moderate/suspicious, untrusted) www.Outpost.Pro
  • 43. Easy Proactive Protection Smart Decision – “Personal Virus Adviser” 5-level rating (trusted/good, moderate/suspicious, untrusted) www.Outpost.Pro
  • 44. Easy Proactive Protection ImproveNet system for safe configuration auto-creation Auto-Learn to remember user’s typical activity to decrease interaction after training period www.Outpost.Pro
  • 45. c. Personal Firewall www.Outpost.Pro
  • 46. What’s Inside. Firewall  Network access rules for every present application www.Outpost.Pro
  • 47. What’s Inside - Firewall www.Outpost.Pro
  • 48. What’s Inside - Firewall  Local Area Network security rules All domains supported and auto-resolved www.Outpost.Pro
  • 49. What’s Inside - Firewall Attack Detection:  Blocking intrusion attempts  Customizable lists for hosts & vulnerable/malware ports www.Outpost.Pro
  • 50. What’s Inside - Firewall IP BlockList:  Manual (add IP range by domain)  Importable/Exportable lists www.Outpost.Pro
  • 51. d. Web Surfing Security and Control www.Outpost.Pro
  • 52. What’s Inside - Web Control www.Outpost.Pro
  • 53. What’s Inside - Web Control To secure websites surfing, e-mail and news feeds:  Ad blocking (by size/name/format)  Active web page elements filter  Automated/manual URL “black lists”  “Stop words” web filter  Web script scanner www.Outpost.Pro
  • 54. What’s Inside - Web Control ID Block:  To block ID (passwords, credit card numbers. etc.) transfer via HTTP.  Exclude your trusted sites and secure protocols (HTTPS/SSL). www.Outpost.Pro
  • 55. e. Anti-Spam www.Outpost.Pro
  • 56. What’s Inside - Anti-Spam  Outlook/Outlook Express/The BAT!/Vista Mail/Windows 7 Mail plug-in  Training wizard, white and black lists, filtering levels www.Outpost.Pro
  • 57. Specifications www.Outpost.Pro
  • 58. Outpost 7.5 Specifications www.Outpost.Pro
  • 59. Outpost 7.5 Compatibility Full-range supported Windows platforms: – regular 32-bit and 64-bit Windows: Windows 7 (including SP1), Vista (including SP1 and SP2), Windows XP (SP2 and higher), + Windows Server editions (both 32-bit and 64-bit): Windows Server 2003 (SP1 and higher), Windows Server 2008 (including 2008 R2). Supported email clients for anti-spam: The Bat!, Windows Mail, Outlook Express, Outlook (all versions). Supported email protocols & services: POP3, SMTP, IMAP. Compatibility mode for some 3-rd party anti-virus tools. www.Outpost.Pro
  • 60. Outpost 7.5 PC Requirements Minimal hardware requirements x86-/x64-/multi-core CPU, Starting from 450 MHz (Intel/AMD-compatible) and 256 MB RAM. Miminum 350MB free hard disk space (for Antivirus and Security Suite, Firewall – 200 MB hard disk space). www.Outpost.Pro
  • 61. Why Outpost Pro? www.Outpost.Pro
  • 62. Why Outpost Pro Works for both beginning and advanced users • Personal Virus Adviser – SmartDecision visual recommendations with corresponding color security alerts • ImproveNet – cloud-based system since 2006 Outpost user community and Agnitum collaborate to deliver and auto-apply verified firewall/proactive protection configurations • Easy to install and use:  Simple and Expert modes (configuration and main window views)  Auto-Learn (self-learn) mode to remember user’s behavior  Entertainment (for games & video) mode www.Outpost.Pro
  • 63. Why Outpost Pro I. Malware protection and performance a. Certified malware detection and blocking  Top industry malware blocking (PCMag test, July 2011) via PCMag.com http://goo.gl/CN2Jm  8 Virus Bulletin awards in-a-row on all current Windows OS via VirusBtn.com http://goo.gl/cWZci WinXP 2008 R2 Vista SP2 2003 SP2 Win7 WinXP 2008 R2 www.Outpost.Pro
  • 64. Why Outpost Pro I. Malware protection and performance b. High-speed scanning and low resource consumption  3 Gold Awards in Antivirus Performance Tests in 2011: outperforms industry average antivirus by 84% via Anti-Malware-Test.com http://goo.gl/E9iMA www.Outpost.Pro
  • 65. Why Outpost Pro II. Proactive Protection and Self-Protection a. Preemptive blocking of new/unknown malware  7 “Excellent!” awards in Proactive Security Challenge (scored 89-99%) since 2008 via Matousec.com http://goo.gl/iMgcY www.Outpost.Pro
  • 66. Why Outpost Pro II. Proactive Protection and Self-Protection b. Protection that is always ON:  Excellent self-protection against targeted protection deactivation via Anti-Malware-Test.org http://goo.gl/SWcq2 (32-bit) and http://goo.gl/J7fTb (64-bit), WinXP and W7 tests since 2010 www.Outpost.Pro
  • 67. Licensing Policy www.Outpost.Pro
  • 68. Licensing Policy Active license covers: Lifetime right to use software, free priority updates for software services, free technical support (email, web, online chat), free upgrade to major and minor releases. www.Outpost.Pro
  • 69. Prices for home users Single license (1 PC, any OS) Starting Starting Starting at $29.95 at $29.95 at $19.95 For 3 PCs For 1 PC For 1 PC Also available: Personal Pack (3 PC at 1 home), Family Pack (up to 5 home PCs) www.Outpost.Pro
  • 70. Prices for organizations Business license per 1 PC Starting Starting Starting at $29.95 at $49.95 at $39.95 Also available: Volume discount prices (1-4, 5-9, 10- 25 PCs, etc.) on request www.Outpost.Pro
  • 71. Prices for organizations Educational license per 1 PC For educational, academic and non-commercial institutions (discounts = 30 % OFF the business license price) Also available: Volume discount prices (1-4, 5-9, 10- 25 PCs, etc.) on request www.Outpost.Pro
  • 72. Discounts RENEWAL Discounts 40% OFF 40% OFF 50% OFF Also available: Lifetime support and upgrade license (only for Firewall for personal/home use) www.Outpost.Pro
  • 73. Discounts MIGRATION discounts OR => 40% OFF PLUS => FREE Also available: Single License -> Personal Pack upgrade Personal Pack -> Family License upgrade www.Outpost.Pro
  • 74. www.Agnitum.com Thank you for your time! Visit www.Agnitum.com now and download your free full-function 30-day copy! www.Outpost.Pro