• 墨西哥地震与球队进球民众跳跃啥关系?专家:无关 2019-03-23
  • 四件圆明园流散文物汉白玉螭头“回家” 2019-03-22
  • 中央环保督察回头看在龙江 动真格办实事我省群众点赞中央环保督察 2019-03-22
  • 我省将建教师个人师德报告制度 2019-03-20
  • 长治举行 “6.16”大型安全生产宣传咨询日活动 2019-03-17
  • 男子聚餐喝啤酒不喝白酒 被朋友认为不给面子殴打 2019-03-17
  • Anti-Malware

    Anti-Malware

     

    MULTI-LAYERED

     

    ANTI-MALWARE

     

    The Network Box Anti-Malware system provides 16 anti-malware engines, running over 12 million signatures, to identify and prevent viruses, trojans, worms and other malicious software, from infecting your networked systems or networked smart devices.

     

    Additionally, the anti-malware system transparently scans and analyzes incoming and outgoing SMTP emails, HTTP and FTP protocols for malware. Even attachments such as .exe.zip files, and other compression and encoding formats are decoded and scanned. Furthermore, external emails from POP3 and IMAP accounts are also scanned to ensure your network is secured.

     

    The malware signature database that powers the anti-malware system is updated in real-time, using Network Box's patented PUSH Technology.

     

     

     

    Anti-Malware

    Engines

     

    Crypto Hash Checks

    Compares each object in the message with a database of malicious object signatures.

     

    Regular Expression Checks

    Uses regular expressions to look for common malicious code structures.

     

    Illegal MIME

    Looks for illegal structures and formatting in MIME email messages.

     

    Kaspersky Message Scanner

    Used to run the Kaspersky AVP anti-virus scanner against the entire message.

     

    Kaspersky Object Scanner

    Used to run the Kaspersky AVP anti-virus scanner against unpacked objects found inside the email message.

     

    Clam Object Scanner

    Used to optionally run the Clam anti-virus scanner against unpacked objects found inside the email message.

     

    Bagle Variant Heuristics

    Used to block new, emerging, variants of the Bagle family of viruses.

     

     

    Hidden Executable Heuristics

    Used to determine if executable code is hiding in non-executable file extensions.

     

    Class ID Heuristics

    Checks CLASSID extensions in attached files, as this is a common technique used to bypass anti-virus scanning, or exploit mail reader vulnerabilities.

     

    Blank Extension Heuristics

    Checks file extensions, looking for certain types of blank extension commonly used to bypass anti-virus scanning, or exploit mail reader vulnerabilities.

     

    Multiple Extension Heuristics

    Checks for certain classes of multiple extensions, commonly used to bypass anti-virus scanning, or exploit mail reader vulnerabilities.

     

    Z-Scan

    An in-the-cloud defense shield that provides fast and effective protection against emerging zero-day malware.

     

     

    Malware engines info

     

     

    Key Features

    Engines and Singnatures

    16 Engines

    12,000,000+ Malware Signatures*

    100% Triple Tolly rating

    Triple 100% Tolly Group detection rating against their Extended Wildlist Malware database over HTTP, SMTP and POP3 protocols.

    Mobile malware protection

    Anti-mobile malware protection.

     

     

    *For more information and real-time statistics:

    Go to Security Response site



  • 墨西哥地震与球队进球民众跳跃啥关系?专家:无关 2019-03-23
  • 四件圆明园流散文物汉白玉螭头“回家” 2019-03-22
  • 中央环保督察回头看在龙江 动真格办实事我省群众点赞中央环保督察 2019-03-22
  • 我省将建教师个人师德报告制度 2019-03-20
  • 长治举行 “6.16”大型安全生产宣传咨询日活动 2019-03-17
  • 男子聚餐喝啤酒不喝白酒 被朋友认为不给面子殴打 2019-03-17