The following table describes how the different components of Worry-Free Business Security protect your computers from threats.
Threat |
Protection |
---|---|
Virus/Malware. Virus, Trojans, Worms, Backdoors, and Rootkits Spyware/Grayware. Spyware, Dialers, Hacking tools, Password cracking applications, Adware, Joke programs, and Keyloggers |
File-based scans (Real-time Scan, Manual Scan, Scheduled Scan) |
Security threats transmitted through email messages |
POP3 Mail Scan in the Security Agent |
Network worms/viruses and intrusions |
Firewall in the Security Agent |
Conceivably harmful websites/Phishing sites |
Web Reputation and URL Filtering in the Security Agent |
Security threats that spread through USB and other external devices |
Device Control in the Security Agent |
Malicious behavior |
Behavior Monitoring in the Security Agent |
Ransomware programs that target documents that run on endpoints |
Behavior Monitoring and Predictive Machine Learning in the Security Agent |