SlideShare a Scribd company logo
1 of 2
Download to read offline
Aluria Anti­Spyware SDKs 
              Proven, reliable and robust gateway and desktop anti­spyware technologyfromAluria Software. 

    Local Points                                                                                                                                                               Forms of Spyware 
      of Entry               !                                                                                                                  !          Internet            •  Adware 
(Discs,Thumbdrives, Etc.)                                                                                                                                  (Threat Pool) 
                                                                                                                                                                               •  Backdoor 
                   !                                                                                                                                  !                        •  Cookies 
     !                                                                                                                                                                 !       •  Homepage Hijacker 
                                                                                                                                                                               •  Searchpage Hijacker 
                                                                                                                                                                               •  Rogue ActiveX 
                                                                                                                                                                               •  BHO 
                                                                                                                                                                               •  Emailer 
                                                                                                                                                                               •  Keylogger 
                                                                                                                                                                               •  Dialer 
                                                                                                                                                                               •  Remote AdminTools 
                                                                                                                                                                               •  Security Software Subverter 
                                                                                                                                                                               • Trojan 
                                                                                                                                                                               •  Malware 
                                                                                                                                                                               • Thiefware 
                                                                                                                                                                               •  Dataminer 
         Dual Layered Protection                                                                                                                                               •  Surveillance Software 
 Unique to our industry, the Aluria family of protection SDKs offers complete multi­layered protection against spyware.                                                        •  Consumerware 
 Two independently engineered SDKs ­ one Desktop/Server, one Gateway ­ can be combined to stop spyware from entering                                                           •  Covert Installer 
 a network regardless of point of entry ­ whether Web, disk, e­mail, etc. 
                                                                                                                                                                               •  HackerTools 
    Gateway Protection                                                                     Desktop/Server Protection 
 ­ Installed on the server/gateway                                                      ­ Installed on individual desktops and network servers 
 ­ Protects against external threats (i.e. file traffic, Web sites and IP addresses)    ­ Active Defense Shield (ADS) 
 ­ Built on vast Aluria/EarthLink definitions database                                      ­ Blocks in real time & at the kernel level 
 ­ Adds value to IDS/IPS/NAC solutions                                                      ­ Protects registry & file system through all entry points 
                                                                                                ­ Protects from both internal and external threats, and is an ideal 
                                                                                                  solution for stopping spyware with elusive morphing properties 
                                                                                        ­ Scans on demand 

The Aluria family of SDKs are feature rich and versatile, requiring minimal development effort while 
providing maximum opportunity for a rapid return on investment. 
Gateway Protection                                                         Desktop/Server Protection                                             Database 
•  Designed specifically for network gateways                              •  Comprehensive scan engine and spyware                              Created in 1999, Aluria’s definitions database 
•  Works with the Desktop/Server Protection SDK                               definition database deliver accurate and                           continues to be among the largest and most 
•  Blocks spyware at the gateway ­ before it                                  reliable scan results and removal routines                         definitive in the world, fully supported by one of the 
   reaches the network                                                     •  Robust anti­spyware application                                    most dynamic and aggressive research teams in the 
•  Similar feature set as the Desktop/Server                               •  Programming interface (API)                                        industry. With a direct tie to EarthLink, (our parent 
   Protection SDK                                                          •  Written in C++ with full interoperability with                     company), and its 7 million residential and 
•  Supported Operating Systems: Windows                                       VB, MFC, Win32, C, C++ and C#                                      commercial subscribers, Aluria Software is uniquely 
   9X to 2003, Linux (Debian, Mandrake, SUSE,                              •  Scanning and quarantining ability for                              able to identify threats in real time. The same cannot 
   Red Hat, Knoppix) and Unix (FreeBSD, NetBSD)                               in­memory processes, registry keys,                                be said for other anti­spyware companies dependent 
•  Supported architectures: X86, 32bit Little                                 files/directories, services, drivers and cookies                   upon third­party updates which many times result in 
   Endian, ARM Big Endian/Little Endian, MIsPS                             •  Customizable definition files                                      less­than­reliable protection. 
   Big Endian/Little Endian                                                •  Choice of full or partial definition load 
•  Includes multi­faceted protection and monitoring                        •  Supports COM­based applications                                    Aluria’s massive spyware database is constantly 
•  Monitors file traffic, Web sites and IP addresses                       •  Multi­threading capability                                         updated to provide our OEM and ISV partners with 
•  Scans compressed files (future release)                                 •  Incremental update capability                                      the latest spyware signatures and profiles, ensuring 
•  Notifies based on events                                                •  High­speed scans                                                   your customers’ information remains secure. 
•  Ability to use shim libraries (future release) 
•  Targets customized Linux operating systems 



Contact                                                                                                                                           More Info 
1.888.627.4650                                                                                                                                    To learn more about Aluria’s technology visit 
oemsales@aluriacorporate.com                                                                                                                      www.aluriasoftware.com/technology/ 

More Related Content

Similar to SDK Datasheet

Moving Security Model From Content to Context
Moving Security Model From Content to ContextMoving Security Model From Content to Context
Moving Security Model From Content to ContextPaolo Passeri
 
[CB19] tknk_scanner v2:community-based integrated malware identification syst...
[CB19] tknk_scanner v2:community-based integrated malware identification syst...[CB19] tknk_scanner v2:community-based integrated malware identification syst...
[CB19] tknk_scanner v2:community-based integrated malware identification syst...CODE BLUE
 
E2 Labs: ADVANCED PROGRAM ON: THE SECURITY OF A WEBSITE
E2 Labs: ADVANCED PROGRAM ON: THE SECURITY OF A WEBSITEE2 Labs: ADVANCED PROGRAM ON: THE SECURITY OF A WEBSITE
E2 Labs: ADVANCED PROGRAM ON: THE SECURITY OF A WEBSITEe2-labs
 
Mu Studio Performance Suite
Mu Studio Performance SuiteMu Studio Performance Suite
Mu Studio Performance Suiteaquaphlex
 
الدعم الفني المقدم من هيئة الاتصالات وتقنية المعلومات
الدعم الفني المقدم من هيئة الاتصالات وتقنية المعلوماتالدعم الفني المقدم من هيئة الاتصالات وتقنية المعلومات
الدعم الفني المقدم من هيئة الاتصالات وتقنية المعلوماتosuhaibany
 
GTB Data Loss Prevention
GTB Data Loss PreventionGTB Data Loss Prevention
GTB Data Loss Preventionrefaeli
 
Cyberscout Presentation
Cyberscout PresentationCyberscout Presentation
Cyberscout PresentationFiroze Hussain
 
تطوير التطبيقات التفاعلية باستخدام Unity
تطوير التطبيقات التفاعلية باستخدام Unity تطوير التطبيقات التفاعلية باستخدام Unity
تطوير التطبيقات التفاعلية باستخدام Unity Ahmed
 
Gannon -u_of_t_presentation_2011
Gannon  -u_of_t_presentation_2011Gannon  -u_of_t_presentation_2011
Gannon -u_of_t_presentation_2011James Gannon
 
Hp Fortify Pillar
Hp Fortify PillarHp Fortify Pillar
Hp Fortify PillarEd Wong
 
Securing mobile population for White Hats
Securing mobile population for White HatsSecuring mobile population for White Hats
Securing mobile population for White HatsVladimir Jirasek
 
Єгор Попович, CTO @Tesseract, (Lviv, Ukraine) "Blockchain user: myth or reali...
Єгор Попович, CTO @Tesseract, (Lviv, Ukraine) "Blockchain user: myth or reali...Єгор Попович, CTO @Tesseract, (Lviv, Ukraine) "Blockchain user: myth or reali...
Єгор Попович, CTO @Tesseract, (Lviv, Ukraine) "Blockchain user: myth or reali...Dakiry
 
Clavister security for virtualized environment
Clavister security for virtualized environmentClavister security for virtualized environment
Clavister security for virtualized environmentnicolasotira
 
Achieving genuine elastic multitenancy with the Waratek Cloud VM for Java : J...
Achieving genuine elastic multitenancy with the Waratek Cloud VM for Java : J...Achieving genuine elastic multitenancy with the Waratek Cloud VM for Java : J...
Achieving genuine elastic multitenancy with the Waratek Cloud VM for Java : J...JAX London
 
企业开发领域的语言特性
企业开发领域的语言特性企业开发领域的语言特性
企业开发领域的语言特性jeffz
 
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...Eric Kolb
 
Data distribution in the cloud with Node.js
Data distribution in the cloud with Node.jsData distribution in the cloud with Node.js
Data distribution in the cloud with Node.jsdarach
 

Similar to SDK Datasheet (20)

Moving Security Model From Content to Context
Moving Security Model From Content to ContextMoving Security Model From Content to Context
Moving Security Model From Content to Context
 
[CB19] tknk_scanner v2:community-based integrated malware identification syst...
[CB19] tknk_scanner v2:community-based integrated malware identification syst...[CB19] tknk_scanner v2:community-based integrated malware identification syst...
[CB19] tknk_scanner v2:community-based integrated malware identification syst...
 
E2 Labs: ADVANCED PROGRAM ON: THE SECURITY OF A WEBSITE
E2 Labs: ADVANCED PROGRAM ON: THE SECURITY OF A WEBSITEE2 Labs: ADVANCED PROGRAM ON: THE SECURITY OF A WEBSITE
E2 Labs: ADVANCED PROGRAM ON: THE SECURITY OF A WEBSITE
 
Mu Studio Performance Suite
Mu Studio Performance SuiteMu Studio Performance Suite
Mu Studio Performance Suite
 
الدعم الفني المقدم من هيئة الاتصالات وتقنية المعلومات
الدعم الفني المقدم من هيئة الاتصالات وتقنية المعلوماتالدعم الفني المقدم من هيئة الاتصالات وتقنية المعلومات
الدعم الفني المقدم من هيئة الاتصالات وتقنية المعلومات
 
GTB Data Loss Prevention
GTB Data Loss PreventionGTB Data Loss Prevention
GTB Data Loss Prevention
 
Cyberscout Presentation
Cyberscout PresentationCyberscout Presentation
Cyberscout Presentation
 
تطوير التطبيقات التفاعلية باستخدام Unity
تطوير التطبيقات التفاعلية باستخدام Unity تطوير التطبيقات التفاعلية باستخدام Unity
تطوير التطبيقات التفاعلية باستخدام Unity
 
Gannon -u_of_t_presentation_2011
Gannon  -u_of_t_presentation_2011Gannon  -u_of_t_presentation_2011
Gannon -u_of_t_presentation_2011
 
Hp Fortify Pillar
Hp Fortify PillarHp Fortify Pillar
Hp Fortify Pillar
 
Securing mobile population for White Hats
Securing mobile population for White HatsSecuring mobile population for White Hats
Securing mobile population for White Hats
 
Єгор Попович, CTO @Tesseract, (Lviv, Ukraine) "Blockchain user: myth or reali...
Єгор Попович, CTO @Tesseract, (Lviv, Ukraine) "Blockchain user: myth or reali...Єгор Попович, CTO @Tesseract, (Lviv, Ukraine) "Blockchain user: myth or reali...
Єгор Попович, CTO @Tesseract, (Lviv, Ukraine) "Blockchain user: myth or reali...
 
Keyloger & spyware
Keyloger & spyware Keyloger & spyware
Keyloger & spyware
 
E Convergence Solutions
E Convergence SolutionsE Convergence Solutions
E Convergence Solutions
 
Clavister security for virtualized environment
Clavister security for virtualized environmentClavister security for virtualized environment
Clavister security for virtualized environment
 
Achieving genuine elastic multitenancy with the Waratek Cloud VM for Java : J...
Achieving genuine elastic multitenancy with the Waratek Cloud VM for Java : J...Achieving genuine elastic multitenancy with the Waratek Cloud VM for Java : J...
Achieving genuine elastic multitenancy with the Waratek Cloud VM for Java : J...
 
企业开发领域的语言特性
企业开发领域的语言特性企业开发领域的语言特性
企业开发领域的语言特性
 
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
Pirates, Bandits, and Ne'erdowells: Practical Protection in the Dangerous Dig...
 
Data distribution in the cloud with Node.js
Data distribution in the cloud with Node.jsData distribution in the cloud with Node.js
Data distribution in the cloud with Node.js
 
Cracking the Mobile Application Code
Cracking the Mobile Application CodeCracking the Mobile Application Code
Cracking the Mobile Application Code
 

SDK Datasheet

  • 1.
  • 2. Aluria Anti­Spyware SDKs  Proven, reliable and robust gateway and desktop anti­spyware technologyfromAluria Software.  Local Points  Forms of Spyware  of Entry  ! ! Internet  •  Adware  (Discs,Thumbdrives, Etc.)  (Threat Pool)  •  Backdoor  ! ! •  Cookies  ! ! •  Homepage Hijacker  •  Searchpage Hijacker  •  Rogue ActiveX  •  BHO  •  Emailer  •  Keylogger  •  Dialer  •  Remote AdminTools  •  Security Software Subverter  • Trojan  •  Malware  • Thiefware  •  Dataminer  Dual Layered Protection  •  Surveillance Software  Unique to our industry, the Aluria family of protection SDKs offers complete multi­layered protection against spyware.  •  Consumerware  Two independently engineered SDKs ­ one Desktop/Server, one Gateway ­ can be combined to stop spyware from entering  •  Covert Installer  a network regardless of point of entry ­ whether Web, disk, e­mail, etc.  •  HackerTools  Gateway Protection  Desktop/Server Protection  ­ Installed on the server/gateway  ­ Installed on individual desktops and network servers  ­ Protects against external threats (i.e. file traffic, Web sites and IP addresses)  ­ Active Defense Shield (ADS)  ­ Built on vast Aluria/EarthLink definitions database  ­ Blocks in real time & at the kernel level  ­ Adds value to IDS/IPS/NAC solutions  ­ Protects registry & file system through all entry points  ­ Protects from both internal and external threats, and is an ideal  solution for stopping spyware with elusive morphing properties  ­ Scans on demand  The Aluria family of SDKs are feature rich and versatile, requiring minimal development effort while  providing maximum opportunity for a rapid return on investment.  Gateway Protection  Desktop/Server Protection  Database  •  Designed specifically for network gateways  •  Comprehensive scan engine and spyware  Created in 1999, Aluria’s definitions database  •  Works with the Desktop/Server Protection SDK  definition database deliver accurate and  continues to be among the largest and most  •  Blocks spyware at the gateway ­ before it  reliable scan results and removal routines  definitive in the world, fully supported by one of the  reaches the network  •  Robust anti­spyware application  most dynamic and aggressive research teams in the  •  Similar feature set as the Desktop/Server  •  Programming interface (API)  industry. With a direct tie to EarthLink, (our parent  Protection SDK  •  Written in C++ with full interoperability with  company), and its 7 million residential and  •  Supported Operating Systems: Windows  VB, MFC, Win32, C, C++ and C#  commercial subscribers, Aluria Software is uniquely  9X to 2003, Linux (Debian, Mandrake, SUSE,  •  Scanning and quarantining ability for  able to identify threats in real time. The same cannot  Red Hat, Knoppix) and Unix (FreeBSD, NetBSD)  in­memory processes, registry keys,  be said for other anti­spyware companies dependent  •  Supported architectures: X86, 32bit Little  files/directories, services, drivers and cookies  upon third­party updates which many times result in  Endian, ARM Big Endian/Little Endian, MIsPS  •  Customizable definition files  less­than­reliable protection.  Big Endian/Little Endian  •  Choice of full or partial definition load  •  Includes multi­faceted protection and monitoring  •  Supports COM­based applications  Aluria’s massive spyware database is constantly  •  Monitors file traffic, Web sites and IP addresses  •  Multi­threading capability  updated to provide our OEM and ISV partners with  •  Scans compressed files (future release)  •  Incremental update capability  the latest spyware signatures and profiles, ensuring  •  Notifies based on events  •  High­speed scans  your customers’ information remains secure.  •  Ability to use shim libraries (future release)  •  Targets customized Linux operating systems  Contact  More Info  1.888.627.4650  To learn more about Aluria’s technology visit  oemsales@aluriacorporate.com  www.aluriasoftware.com/technology/