SlideShare a Scribd company logo
1 of 55
Download to read offline
Outpost PRO
    Proactive PC Security since 2002




Performance Edition 7.5
       Released June 15, 2011


       Quick Tour
            www.Agnitum.com
Outpost PRO 7.5
 with Personal Virus Adviser




   PROACTIVE APPROACH
Contents:
1.   About Outpost Pro
2.   Functionality
3.   Version 7.5 – What’s New
4.   How Outpost Secures PC
5.   Why Outpost Pro?
6.   What’s Inside:
      A.   Anti-Malware
      B.   Proactive Protection
      C.   Personal Firewall
      D.   Web Surfing Security
      E.   Anti-Spam
7. Specifications
8. Licensing policy
           www.Outpost.Pro
About Outpost Pro



     www.Outpost.Pro
Outpost PRO is:
1. MALWARE FIGHTER

  2. CONNECTION PROTECTOR

     3. UNWANTED CONTENT FILTER

        4. WEB SURFING PRIVACY KEEPER

           5. PRIVATE DATA LOCKER

             6. JUNK MAIL PREVENTER

                7. ADVANCED ANALYSIS TOOLKIT

                  www.Outpost.Pro
Outpost PRO
      Proactive PC Security since 2002




   Outpost Firewall Pro
  Outpost Antivirus Pro
Outpost Security Suite Pro
Functionality



   www.Outpost.Pro
Outpost Antivirus Pro 7.5 –
       Security for non-expert PC users




Anti-virus + anti-spyware efficiently stops and removes malware from your PC.
Outpost Firewall Pro 7.5 – protection against
  cyber attacks, spyware, and new threats




 Leading PC firewall with antispyware, proactive defense and secure browsing
Outpost Security Suite Pro 7.5 – all-in-one
        Proactive Internet security
Outpost key functionality
1. Known malware/spyware detection/deactivation/clean-up

2. New/unknown malware and spyware blocking

3. Network connections security

4. Web surfing/web privacy control

5. Personal data access protection

6. Mail protection and filtering

7. Sophisticated analysis tools – and more!

                       www.Outpost.Pro
Outpost Pro components
• Anti-Malware (Anti-Virus + Anti-Spyware)

• Personal Firewall:
      • Application Firewall + Attack Detection + IP BlockList

• Proactive Protection:
      • Anti-Leak + System Guard + Application Guard
      • File & Folder Lock + Removable Media Protection

• Web surfing Control:
      • Ad and content block + URL blacklist + ID Block

• Anti-Spam

                     www.Outpost.Pro
Outpost Pro extensions
• ImproveNet technology
       (cloud-based system to provide secure configurations)

• SmartScan technology
       (optimization for fast subsequent malware scans)

• SmartDecision technology (NEW!):
       (Personal Virus Adviser for smart security decision-making)

• Analysis tools:
       • File and Registry Activity monitor
       conceptually similar to Mark Russinovich’s SysMon and RegMon
       • Event Viewer (detailed activity logs)


                        www.Outpost.Pro
Products comparison




      www.Outpost.Pro
Version 7.5 –
What’s New



   www.Outpost.Pro
Outpost 7.5 – What’s New?




         www.Outpost.Pro
Outpost 7.5. What’s New?


SmartDecision technology – “Personal Virus Adviser”
5 levels for starting files/processes with ratings andvisual alerts

Proactive clipboard and screen content protection

Customizable USB/CD/DVD storage vulnerability protection
5 levels of customization for manual block/unblock autorun

Anti-Malware – PDF filtering

Proactive Protection – color-coded alerts and other options

                       www.Outpost.Pro
Outpost 7.5 What’s Improved?

 3x faster web content filtering

 Up to 2.5x faster on-access and on-demand scanning

 Updated anti-malware engine and detection rate

 SmartScan generation 4 – 3-5x faster subsequent malware scans

 More secure auto-learn function for infected systems

 Full firewall compatibility with mobile broadband devices

 Security for 64-bit platforms
                       www.Outpost.Pro
How Outpost
secures your PC



    www.Outpost.Pro
Outpost 7.5 - How It Works




 Learn more at http://goo.gl/fcunw How Outpost 7.5 secures your PC
                         www.Outpost.Pro
Why Outpost Pro?



     www.Outpost.Pro
Why Outpost Pro
 Works for both beginning and advanced users
• Personal Virus Adviser – SmartDecision
       visual recommendations with corresponding color security alerts

• ImproveNet – cloud-based system since 2006
     Outpost user community and Agnitum collaborate to deliver and
     auto-apply verified firewall/proactive protection configurations

• Easy to install and use:
    Simple and Expert modes (configuration and main window views)
    Auto-Learn (self-learn) mode to remember user’s behavior
    Entertainment (for games & video) mode

                          www.Outpost.Pro
Why Outpost Pro
I. Malware protection and performance
a. Certified malware detection and blocking
    Top industry malware blocking (PCMag test, July 2011) via
     PCMag.com http://goo.gl/CN2Jm

    8 Virus Bulletin awards in-a-row on all current Windows OS via
     VirusBtn.com http://goo.gl/cWZci




    WinXP    2008 R2   Vista SP2   2003 SP2   Win7   WinXP   2008 R2

                             www.Outpost.Pro
Why Outpost Pro
I. Malware protection and performance
b. High-speed scanning and low resource consumption

   3 Gold Awards in Antivirus Performance Tests in 2011:
     outperforms industry average antivirus by 84%
     via Anti-Malware-Test.com http://goo.gl/E9iMA




                        www.Outpost.Pro
Why Outpost Pro
II. Proactive Protection and Self-Protection
a. Preemptive blocking of new/unknown malware

   7 “Excellent!” awards in Proactive Security Challenge (scored
    89-99%) since 2008 via Matousec.com http://goo.gl/iMgcY




                        www.Outpost.Pro
Why Outpost Pro
II. Proactive Protection and Self-Protection
b. Protection that is always ON:

    Excellent self-protection against targeted protection deactivation
     via Anti-Malware-Test.org http://goo.gl/SWcq2 (32-bit) and
     http://goo.gl/J7fTb (64-bit), Windows XP and W7 tests (2010-2011)




                         www.Outpost.Pro
What’s Inside



   www.Outpost.Pro
Outpost’s Proactive Approach
   Proactive Protection is the Key:
  Tracks OS and applications behavior

  Prevents hijacking of your OS

  Prevents hijacking and misuse of your applications

  Protects passwords and IDs used in OS/applications

  Hides your valuable data in designated files and folders

  Prevents your data from leaking or being stolen

  Lets you manage additional system settings (like autorun)
                     www.Outpost.Pro
…but Anti-Malware is still ON




          www.Outpost.Pro
Outpost’s Anti-Malware
Combined Anti-Virus + Anti-Spyware
  for fixed, network and removable drives, mail and web content:
        On-access monitor
        On-demand scanner
        Mail attachment filter
        Malware quarantine
        Simple repair/disinfection
        Scans web pages/mail/
          news feeds




                         www.Outpost.Pro
Outpost’s Anti-Malware
Additional technologies:
 Heuristic Analysis (normal/in-depth)

 eXtended Heuristic Analyzer
(HAX, integrated with SmartDecision)

 SmartScan 4 technology
(2x-10x faster scans for repeated scans)

 “SPE Analysis” (anti-malware
integration with SmartDecision)

One-click file submission to Agnitum
(for the potential malware found)
                            www.Outpost.Pro
PROACTIVE APPROACH
1. OS integrity + applications control
  • System Guard Improved!
     prevents your system from being hijacked – unauthorized applications
        cannot “touch” your OS. Secures critical system files + configurations
        (system registry settings) against misuse or compromise.

  • Anti-Leak control (stops new threats activation) Improved!
    prevents your OS from being infected by unknown threats

  • Self Defense Improved!
    Outpost protection cannot be terminated by malicious code

  • Removable Media Protection NEW!
    5-level management for auto-run applications from CD/DVD/USB storage
                            www.Outpost.Pro
PROACTIVE APPROACH
2. Smart Decision, “Personal Virus Adviser”,
5-level rating for the starting files/processes




                 www.Outpost.Pro
PROACTIVE APPROACH
3. Privacy and analysis tools:
  • Application Guard Improved!
    prevents sensitive data (IDs, logins, passwords, account numbers) stored
    by Internet-enabled applications such as IM (instant messaging), web
    browsers, e-mail clients and e-banking software from being compromised.

  • File and Folder Lock
    protects locally-stored assets from corruption, modification, or illegal
    access by other users or malware.

  • Real-time File and Registry Activity Monitoring
    lets you examine system events at close range by monitoring activity
    of any given active process and tracking system changes in real time.

                           www.Outpost.Pro
Proactive System Protection




 System Protection:
  Anti-Leak
 Component Control
 System Guard

               www.Outpost.Pro
Proactive Application Control




Applications control:
Auto-run management
Applications data Guard




                   www.Outpost.Pro
Proactive Data Privacy
Theft/Corruption Prevention and Privacy:
File and Folder Lock to protect selected locations




                       www.Outpost.Pro
Proactive Task Management




     Additional analysis/management tool:
      Process activity monitor (Outpost’s Task Manager)



              www.Outpost.Pro
PROACTIVE APPROACH
4. Ease of use
Auto-Learn mode to remember
typical activity to decrease user
interaction after training period

ImproveNet system for safe
configurations auto-creation




                www.Outpost.Pro
Outpost’s Firewall




 Network access rules for
  every present application




                   www.Outpost.Pro
Outpost’s Firewall




    www.Outpost.Pro
Outpost’s Web Control




      www.Outpost.Pro
Outpost’s Anti-Spam




   Plug-in for Outlook, Outlook Express, The BAT!, Vista, and Windows 7 Mail
   Training wizard, white and black lists
                           www.Outpost.Pro
Specifications




   www.Outpost.Pro
Outpost 7.5 Specifications




         www.Outpost.Pro
Outpost 7.5 Compatibility
   Full-range supported Windows platforms:
   – regular 32-bit and 64-bit Windows:
             Windows 7 (including SP1),
             Vista (including SP1 and SP2),
             Windows XP (SP2 and higher),
   + Windows Server editions (both 32-bit and 64-bit):
             Windows Server 2003 (SP1 and higher),
             Windows Server 2008 (including 2008 R2).

   Supported email clients for anti-spam:
           The Bat!, Windows Mail,
           Outlook Express, Outlook (all versions).

   Supported email protocols & services: POP3, SMTP, IMAP.

   Compatibility mode for some 3-rd party anti-virus tools.


                   www.Outpost.Pro
Outpost 7.5 PC Requirements
               Minimal hardware requirements
                         x86-/x64-/multi-core CPU,
    Starting from 450 MHz (Intel/AMD-compatible) and 256 MB RAM.
                   Miminum 350MB free hard disk space
   (for Antivirus and Security Suite, Firewall – 200 MB hard disk space).




                        www.Outpost.Pro
Licensing Policy




    www.Outpost.Pro
Licensing Policy
            Active license covers:

         Lifetime right to use software,

  free priority updates for software services,

free technical support (email, web, online chat),

   free upgrade to major and minor releases.




                www.Outpost.Pro
Prices for home users
                 Single license
                 (1 PC, any OS)



                Starting      Starting    Starting
               at $29.95     at $29.95   at $19.95
               For 3 PCs      For 1 PC    For 1 PC
                           Also available:

Personal Pack (3 PC at 1 home), Family Pack (up to 5 home PCs)

                     www.Outpost.Pro
Prices for organizations
             Business license
                      per 1 PC



               Starting      Starting    Starting
              at $29.95     at $49.95   at $39.95

                          Also available:

Volume discount prices (1-4, 5-9, 10- 25 PCs, etc.) on request

                    www.Outpost.Pro
Prices for organizations
                  Educational license
                              per 1 PC



         For educational, academic and non-commercial institutions

              (discounts = 30 % OFF the business license price)


Also available: Volume discount prices (1-4, 5-9, 10- 25 PCs, etc.) on request

                            www.Outpost.Pro
Discounts
                RENEWAL
                Discounts



          40% OFF    40% OFF    50% OFF

Also available: Lifetime support and upgrade license

      (only for Firewall for personal/home use)

                www.Outpost.Pro
Discounts
         MIGRATION discounts


OR => 40% OFF                            PLUS => FREE




                       Also available:

           Single License -> Personal Pack upgrade

           Personal Pack -> Family License upgrade

                     www.Outpost.Pro
www.Agnitum.com




Thank you for your time!
Visit www.Agnitum.com now
  and download your free
 full-function 30-day copy!

         www.Outpost.Pro

More Related Content

What's hot

Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...CODE BLUE
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System ThreatsReddhi Basu
 
Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportAjit Gaddam
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a Google
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control أحلام انصارى
 
Application Explosion How to Manage Productivity vs Security
Application Explosion How to Manage Productivity vs SecurityApplication Explosion How to Manage Productivity vs Security
Application Explosion How to Manage Productivity vs SecurityLumension
 
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny ZeltserSecurity Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny ZeltserAnton Chuvakin
 
Nguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s view
Nguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s viewNguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s view
Nguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s viewSecurity Bootcamp
 
Integrated Tools in OSSIM
Integrated Tools in OSSIMIntegrated Tools in OSSIM
Integrated Tools in OSSIMAlienVault
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Andrew Ryan
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsAaron ND Sawmadal
 
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android PhonesLab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android PhonesSyuan Wang
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5AfiqEfendy Zaen
 

What's hot (20)

Program Threats
Program ThreatsProgram Threats
Program Threats
 
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
 
Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability report
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a
 
sym
symsym
sym
 
Mobile Malware
Mobile MalwareMobile Malware
Mobile Malware
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
 
Application Explosion How to Manage Productivity vs Security
Application Explosion How to Manage Productivity vs SecurityApplication Explosion How to Manage Productivity vs Security
Application Explosion How to Manage Productivity vs Security
 
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny ZeltserSecurity Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
 
Nguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s view
Nguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s viewNguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s view
Nguyen Huu Trung - Building a web vulnerability scanner - From a hacker’s view
 
Integrated Tools in OSSIM
Integrated Tools in OSSIMIntegrated Tools in OSSIM
Integrated Tools in OSSIM
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android PhonesLab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones
 
Managing third party libraries
Managing third party librariesManaging third party libraries
Managing third party libraries
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 

Viewers also liked

VENICE. George Corominas (1)
VENICE. George Corominas (1)VENICE. George Corominas (1)
VENICE. George Corominas (1)Cachi Chien
 
Families of Wisdom Ministry to Families handbook
Families of Wisdom Ministry to Families handbookFamilies of Wisdom Ministry to Families handbook
Families of Wisdom Ministry to Families handbookTerrell Patillo
 
Trinity Kings World Leadership: Assessment, Evaluation, Measurement of a Unit...
Trinity Kings World Leadership: Assessment, Evaluation, Measurement of a Unit...Trinity Kings World Leadership: Assessment, Evaluation, Measurement of a Unit...
Trinity Kings World Leadership: Assessment, Evaluation, Measurement of a Unit...Terrell Patillo
 
Tugas Geografi
Tugas GeografiTugas Geografi
Tugas Geografivischoke
 
Little Artists (1 of 2)
Little Artists (1 of 2)Little Artists (1 of 2)
Little Artists (1 of 2)Cachi Chien
 
Sacred Ink Tattoo Festival of Thailand
Sacred Ink Tattoo Festival of ThailandSacred Ink Tattoo Festival of Thailand
Sacred Ink Tattoo Festival of ThailandCachi Chien
 
Musical instruments orchestra
Musical instruments orchestraMusical instruments orchestra
Musical instruments orchestraMila E Freire
 
Instrumental analysis BY Muhammad Fahad Ansari 12IEEM14
Instrumental analysis BY  Muhammad Fahad Ansari 12IEEM14Instrumental analysis BY  Muhammad Fahad Ansari 12IEEM14
Instrumental analysis BY Muhammad Fahad Ansari 12IEEM14fahadansari131
 
Ergonomics BY Muhammad Fahad Ansari 12IEEM14
Ergonomics BY  Muhammad Fahad Ansari 12IEEM14Ergonomics BY  Muhammad Fahad Ansari 12IEEM14
Ergonomics BY Muhammad Fahad Ansari 12IEEM14fahadansari131
 
Option7 Next Steps Seminar
Option7 Next Steps SeminarOption7 Next Steps Seminar
Option7 Next Steps Seminarsustn
 
HR - What All Employers Need To Know...
HR - What All Employers Need To Know...HR - What All Employers Need To Know...
HR - What All Employers Need To Know...sarafaber
 
Do you know....
Do you know....Do you know....
Do you know....Sudha Devi
 
语文一级下册-第三课《邓小平爷爷植树》
语文一级下册-第三课《邓小平爷爷植树》语文一级下册-第三课《邓小平爷爷植树》
语文一级下册-第三课《邓小平爷爷植树》ningli
 
Open Linked Data as Part of a Government Enterprise Architecture
Open Linked Data as Part of a Government Enterprise ArchitectureOpen Linked Data as Part of a Government Enterprise Architecture
Open Linked Data as Part of a Government Enterprise ArchitectureJohann Höchtl
 

Viewers also liked (20)

Media theories
Media theoriesMedia theories
Media theories
 
VENICE. George Corominas (1)
VENICE. George Corominas (1)VENICE. George Corominas (1)
VENICE. George Corominas (1)
 
Families of Wisdom Ministry to Families handbook
Families of Wisdom Ministry to Families handbookFamilies of Wisdom Ministry to Families handbook
Families of Wisdom Ministry to Families handbook
 
Trinity Kings World Leadership: Assessment, Evaluation, Measurement of a Unit...
Trinity Kings World Leadership: Assessment, Evaluation, Measurement of a Unit...Trinity Kings World Leadership: Assessment, Evaluation, Measurement of a Unit...
Trinity Kings World Leadership: Assessment, Evaluation, Measurement of a Unit...
 
Tugas Geografi
Tugas GeografiTugas Geografi
Tugas Geografi
 
Little Artists (1 of 2)
Little Artists (1 of 2)Little Artists (1 of 2)
Little Artists (1 of 2)
 
GOALS AND BENCHMARKS OF THE REFLECTION YEAR
GOALS AND BENCHMARKS OF THE REFLECTION YEARGOALS AND BENCHMARKS OF THE REFLECTION YEAR
GOALS AND BENCHMARKS OF THE REFLECTION YEAR
 
Facebook
FacebookFacebook
Facebook
 
Sacred Ink Tattoo Festival of Thailand
Sacred Ink Tattoo Festival of ThailandSacred Ink Tattoo Festival of Thailand
Sacred Ink Tattoo Festival of Thailand
 
Zharfan comments
Zharfan commentsZharfan comments
Zharfan comments
 
Musical instruments orchestra
Musical instruments orchestraMusical instruments orchestra
Musical instruments orchestra
 
Instrumental analysis BY Muhammad Fahad Ansari 12IEEM14
Instrumental analysis BY  Muhammad Fahad Ansari 12IEEM14Instrumental analysis BY  Muhammad Fahad Ansari 12IEEM14
Instrumental analysis BY Muhammad Fahad Ansari 12IEEM14
 
Ergonomics BY Muhammad Fahad Ansari 12IEEM14
Ergonomics BY  Muhammad Fahad Ansari 12IEEM14Ergonomics BY  Muhammad Fahad Ansari 12IEEM14
Ergonomics BY Muhammad Fahad Ansari 12IEEM14
 
Mariella presentation
Mariella presentationMariella presentation
Mariella presentation
 
Option7 Next Steps Seminar
Option7 Next Steps SeminarOption7 Next Steps Seminar
Option7 Next Steps Seminar
 
HR - What All Employers Need To Know...
HR - What All Employers Need To Know...HR - What All Employers Need To Know...
HR - What All Employers Need To Know...
 
Do you know....
Do you know....Do you know....
Do you know....
 
语文一级下册-第三课《邓小平爷爷植树》
语文一级下册-第三课《邓小平爷爷植树》语文一级下册-第三课《邓小平爷爷植树》
语文一级下册-第三课《邓小平爷爷植树》
 
Open Linked Data as Part of a Government Enterprise Architecture
Open Linked Data as Part of a Government Enterprise ArchitectureOpen Linked Data as Part of a Government Enterprise Architecture
Open Linked Data as Part of a Government Enterprise Architecture
 
Adrianbillytrig
AdrianbillytrigAdrianbillytrig
Adrianbillytrig
 

Similar to Outpost Security Pro 7.5: What's Inside?

Agnitum Outpost Pro product line
Agnitum Outpost Pro product lineAgnitum Outpost Pro product line
Agnitum Outpost Pro product linePavel Fyodorov
 
Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010nuttakorn nakkerd
 
Outpost Anti-Malware 7.5
Outpost Anti-Malware 7.5Outpost Anti-Malware 7.5
Outpost Anti-Malware 7.5Lubov Putsko
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentationsdrayin
 
5 howtomitigate
5 howtomitigate5 howtomitigate
5 howtomitigatericharddxd
 
AV-Comparatives Performance Test
AV-Comparatives Performance TestAV-Comparatives Performance Test
AV-Comparatives Performance TestHerbert Rodriguez
 
Antivirus Comparative junio 2014
Antivirus Comparative junio 2014Antivirus Comparative junio 2014
Antivirus Comparative junio 2014Doryan Mathos
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chanceDr. Anish Cheriyan (PhD)
 
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017Jermund Ottermo
 
Comodo advanced endpoint protection
Comodo advanced endpoint protectionComodo advanced endpoint protection
Comodo advanced endpoint protectionDavid Waugh
 
Venkasure Antivirus Pro
Venkasure Antivirus ProVenkasure Antivirus Pro
Venkasure Antivirus Prorobinshaif
 
AV Comparatives 2013 (Comparación de Antivirus)
AV Comparatives 2013 (Comparación de Antivirus)AV Comparatives 2013 (Comparación de Antivirus)
AV Comparatives 2013 (Comparación de Antivirus)Doryan Mathos
 

Similar to Outpost Security Pro 7.5: What's Inside? (20)

Agnitum Outpost Pro product line
Agnitum Outpost Pro product lineAgnitum Outpost Pro product line
Agnitum Outpost Pro product line
 
Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010
 
Avc prot 2012b_en
Avc prot 2012b_enAvc prot 2012b_en
Avc prot 2012b_en
 
Outpost Anti-Malware 7.5
Outpost Anti-Malware 7.5Outpost Anti-Malware 7.5
Outpost Anti-Malware 7.5
 
Avc prot 2016a_en
Avc prot 2016a_enAvc prot 2016a_en
Avc prot 2016a_en
 
Avc prot 2013a_en
Avc prot 2013a_enAvc prot 2013a_en
Avc prot 2013a_en
 
Top 10 antiviruses
Top 10 antivirusesTop 10 antiviruses
Top 10 antiviruses
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentation
 
5 howtomitigate
5 howtomitigate5 howtomitigate
5 howtomitigate
 
Performance dec 2010
Performance dec 2010Performance dec 2010
Performance dec 2010
 
AV-Comparatives Performance Test
AV-Comparatives Performance TestAV-Comparatives Performance Test
AV-Comparatives Performance Test
 
Antivirus Comparative junio 2014
Antivirus Comparative junio 2014Antivirus Comparative junio 2014
Antivirus Comparative junio 2014
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
 
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
 
Avc per 201206_en
Avc per 201206_enAvc per 201206_en
Avc per 201206_en
 
Comodo advanced endpoint protection
Comodo advanced endpoint protectionComodo advanced endpoint protection
Comodo advanced endpoint protection
 
Venkasure Antivirus Pro
Venkasure Antivirus ProVenkasure Antivirus Pro
Venkasure Antivirus Pro
 
Seguridad Corporativa Con Internet Explorer 8(1)
Seguridad Corporativa Con Internet Explorer 8(1)Seguridad Corporativa Con Internet Explorer 8(1)
Seguridad Corporativa Con Internet Explorer 8(1)
 
Avc per 201304_en
Avc per 201304_enAvc per 201304_en
Avc per 201304_en
 
AV Comparatives 2013 (Comparación de Antivirus)
AV Comparatives 2013 (Comparación de Antivirus)AV Comparatives 2013 (Comparación de Antivirus)
AV Comparatives 2013 (Comparación de Antivirus)
 

Recently uploaded

Employee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India ResearchEmployee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India ResearchSoham Mondal
 
Internshala Student Partner 6.0 Jadavpur University Certificate
Internshala Student Partner 6.0 Jadavpur University CertificateInternshala Student Partner 6.0 Jadavpur University Certificate
Internshala Student Partner 6.0 Jadavpur University CertificateSoham Mondal
 
The Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdfThe Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdftheknowledgereview1
 
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...Suhani Kapoor
 
PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterHector Del Castillo, CPM, CPMM
 
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...Suhani Kapoor
 
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen DatingDubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Datingkojalkojal131
 
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...shivangimorya083
 
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Servicejennyeacort
 
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...Suhani Kapoor
 
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...gurkirankumar98700
 
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service CuttackVIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service CuttackSuhani Kapoor
 
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位obuhobo
 
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012rehmti665
 
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证obuhobo
 
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
Call Girl in Low Price Delhi Punjabi Bagh  9711199012Call Girl in Low Price Delhi Punjabi Bagh  9711199012
Call Girl in Low Price Delhi Punjabi Bagh 9711199012sapnasaifi408
 
Business Development and Product Strategy for a SME named SARL based in Leban...
Business Development and Product Strategy for a SME named SARL based in Leban...Business Development and Product Strategy for a SME named SARL based in Leban...
Business Development and Product Strategy for a SME named SARL based in Leban...Soham Mondal
 
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...Suhani Kapoor
 
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual serviceanilsa9823
 
CFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceCFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceSanjay Bokadia
 

Recently uploaded (20)

Employee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India ResearchEmployee of the Month - Samsung Semiconductor India Research
Employee of the Month - Samsung Semiconductor India Research
 
Internshala Student Partner 6.0 Jadavpur University Certificate
Internshala Student Partner 6.0 Jadavpur University CertificateInternshala Student Partner 6.0 Jadavpur University Certificate
Internshala Student Partner 6.0 Jadavpur University Certificate
 
The Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdfThe Impact of Socioeconomic Status on Education.pdf
The Impact of Socioeconomic Status on Education.pdf
 
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
 
PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring Chapter
 
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
 
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen DatingDubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
 
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
 
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
 
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
 
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
 
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service CuttackVIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
 
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
 
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
 
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
 
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
Call Girl in Low Price Delhi Punjabi Bagh  9711199012Call Girl in Low Price Delhi Punjabi Bagh  9711199012
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
 
Business Development and Product Strategy for a SME named SARL based in Leban...
Business Development and Product Strategy for a SME named SARL based in Leban...Business Development and Product Strategy for a SME named SARL based in Leban...
Business Development and Product Strategy for a SME named SARL based in Leban...
 
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
 
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
 
CFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceCFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector Experience
 

Outpost Security Pro 7.5: What's Inside?

  • 1. Outpost PRO Proactive PC Security since 2002 Performance Edition 7.5 Released June 15, 2011 Quick Tour www.Agnitum.com
  • 2. Outpost PRO 7.5 with Personal Virus Adviser PROACTIVE APPROACH
  • 3. Contents: 1. About Outpost Pro 2. Functionality 3. Version 7.5 – What’s New 4. How Outpost Secures PC 5. Why Outpost Pro? 6. What’s Inside: A. Anti-Malware B. Proactive Protection C. Personal Firewall D. Web Surfing Security E. Anti-Spam 7. Specifications 8. Licensing policy www.Outpost.Pro
  • 4. About Outpost Pro www.Outpost.Pro
  • 5. Outpost PRO is: 1. MALWARE FIGHTER 2. CONNECTION PROTECTOR 3. UNWANTED CONTENT FILTER 4. WEB SURFING PRIVACY KEEPER 5. PRIVATE DATA LOCKER 6. JUNK MAIL PREVENTER 7. ADVANCED ANALYSIS TOOLKIT www.Outpost.Pro
  • 6. Outpost PRO Proactive PC Security since 2002 Outpost Firewall Pro Outpost Antivirus Pro Outpost Security Suite Pro
  • 7. Functionality www.Outpost.Pro
  • 8. Outpost Antivirus Pro 7.5 – Security for non-expert PC users Anti-virus + anti-spyware efficiently stops and removes malware from your PC.
  • 9. Outpost Firewall Pro 7.5 – protection against cyber attacks, spyware, and new threats Leading PC firewall with antispyware, proactive defense and secure browsing
  • 10. Outpost Security Suite Pro 7.5 – all-in-one Proactive Internet security
  • 11. Outpost key functionality 1. Known malware/spyware detection/deactivation/clean-up 2. New/unknown malware and spyware blocking 3. Network connections security 4. Web surfing/web privacy control 5. Personal data access protection 6. Mail protection and filtering 7. Sophisticated analysis tools – and more! www.Outpost.Pro
  • 12. Outpost Pro components • Anti-Malware (Anti-Virus + Anti-Spyware) • Personal Firewall: • Application Firewall + Attack Detection + IP BlockList • Proactive Protection: • Anti-Leak + System Guard + Application Guard • File & Folder Lock + Removable Media Protection • Web surfing Control: • Ad and content block + URL blacklist + ID Block • Anti-Spam www.Outpost.Pro
  • 13. Outpost Pro extensions • ImproveNet technology (cloud-based system to provide secure configurations) • SmartScan technology (optimization for fast subsequent malware scans) • SmartDecision technology (NEW!): (Personal Virus Adviser for smart security decision-making) • Analysis tools: • File and Registry Activity monitor conceptually similar to Mark Russinovich’s SysMon and RegMon • Event Viewer (detailed activity logs) www.Outpost.Pro
  • 14. Products comparison www.Outpost.Pro
  • 15. Version 7.5 – What’s New www.Outpost.Pro
  • 16. Outpost 7.5 – What’s New? www.Outpost.Pro
  • 17. Outpost 7.5. What’s New? SmartDecision technology – “Personal Virus Adviser” 5 levels for starting files/processes with ratings andvisual alerts Proactive clipboard and screen content protection Customizable USB/CD/DVD storage vulnerability protection 5 levels of customization for manual block/unblock autorun Anti-Malware – PDF filtering Proactive Protection – color-coded alerts and other options www.Outpost.Pro
  • 18. Outpost 7.5 What’s Improved? 3x faster web content filtering Up to 2.5x faster on-access and on-demand scanning Updated anti-malware engine and detection rate SmartScan generation 4 – 3-5x faster subsequent malware scans More secure auto-learn function for infected systems Full firewall compatibility with mobile broadband devices Security for 64-bit platforms www.Outpost.Pro
  • 19. How Outpost secures your PC www.Outpost.Pro
  • 20. Outpost 7.5 - How It Works Learn more at http://goo.gl/fcunw How Outpost 7.5 secures your PC www.Outpost.Pro
  • 21. Why Outpost Pro? www.Outpost.Pro
  • 22. Why Outpost Pro Works for both beginning and advanced users • Personal Virus Adviser – SmartDecision visual recommendations with corresponding color security alerts • ImproveNet – cloud-based system since 2006 Outpost user community and Agnitum collaborate to deliver and auto-apply verified firewall/proactive protection configurations • Easy to install and use:  Simple and Expert modes (configuration and main window views)  Auto-Learn (self-learn) mode to remember user’s behavior  Entertainment (for games & video) mode www.Outpost.Pro
  • 23. Why Outpost Pro I. Malware protection and performance a. Certified malware detection and blocking  Top industry malware blocking (PCMag test, July 2011) via PCMag.com http://goo.gl/CN2Jm  8 Virus Bulletin awards in-a-row on all current Windows OS via VirusBtn.com http://goo.gl/cWZci WinXP 2008 R2 Vista SP2 2003 SP2 Win7 WinXP 2008 R2 www.Outpost.Pro
  • 24. Why Outpost Pro I. Malware protection and performance b. High-speed scanning and low resource consumption  3 Gold Awards in Antivirus Performance Tests in 2011: outperforms industry average antivirus by 84% via Anti-Malware-Test.com http://goo.gl/E9iMA www.Outpost.Pro
  • 25. Why Outpost Pro II. Proactive Protection and Self-Protection a. Preemptive blocking of new/unknown malware  7 “Excellent!” awards in Proactive Security Challenge (scored 89-99%) since 2008 via Matousec.com http://goo.gl/iMgcY www.Outpost.Pro
  • 26. Why Outpost Pro II. Proactive Protection and Self-Protection b. Protection that is always ON:  Excellent self-protection against targeted protection deactivation via Anti-Malware-Test.org http://goo.gl/SWcq2 (32-bit) and http://goo.gl/J7fTb (64-bit), Windows XP and W7 tests (2010-2011) www.Outpost.Pro
  • 27. What’s Inside www.Outpost.Pro
  • 28. Outpost’s Proactive Approach Proactive Protection is the Key:  Tracks OS and applications behavior  Prevents hijacking of your OS  Prevents hijacking and misuse of your applications  Protects passwords and IDs used in OS/applications  Hides your valuable data in designated files and folders  Prevents your data from leaking or being stolen  Lets you manage additional system settings (like autorun) www.Outpost.Pro
  • 29. …but Anti-Malware is still ON www.Outpost.Pro
  • 30. Outpost’s Anti-Malware Combined Anti-Virus + Anti-Spyware for fixed, network and removable drives, mail and web content:  On-access monitor  On-demand scanner  Mail attachment filter  Malware quarantine  Simple repair/disinfection  Scans web pages/mail/ news feeds www.Outpost.Pro
  • 31. Outpost’s Anti-Malware Additional technologies:  Heuristic Analysis (normal/in-depth)  eXtended Heuristic Analyzer (HAX, integrated with SmartDecision)  SmartScan 4 technology (2x-10x faster scans for repeated scans)  “SPE Analysis” (anti-malware integration with SmartDecision) One-click file submission to Agnitum (for the potential malware found) www.Outpost.Pro
  • 32. PROACTIVE APPROACH 1. OS integrity + applications control • System Guard Improved! prevents your system from being hijacked – unauthorized applications cannot “touch” your OS. Secures critical system files + configurations (system registry settings) against misuse or compromise. • Anti-Leak control (stops new threats activation) Improved! prevents your OS from being infected by unknown threats • Self Defense Improved! Outpost protection cannot be terminated by malicious code • Removable Media Protection NEW! 5-level management for auto-run applications from CD/DVD/USB storage www.Outpost.Pro
  • 33. PROACTIVE APPROACH 2. Smart Decision, “Personal Virus Adviser”, 5-level rating for the starting files/processes www.Outpost.Pro
  • 34. PROACTIVE APPROACH 3. Privacy and analysis tools: • Application Guard Improved! prevents sensitive data (IDs, logins, passwords, account numbers) stored by Internet-enabled applications such as IM (instant messaging), web browsers, e-mail clients and e-banking software from being compromised. • File and Folder Lock protects locally-stored assets from corruption, modification, or illegal access by other users or malware. • Real-time File and Registry Activity Monitoring lets you examine system events at close range by monitoring activity of any given active process and tracking system changes in real time. www.Outpost.Pro
  • 35. Proactive System Protection System Protection:  Anti-Leak Component Control System Guard www.Outpost.Pro
  • 36. Proactive Application Control Applications control: Auto-run management Applications data Guard www.Outpost.Pro
  • 37. Proactive Data Privacy Theft/Corruption Prevention and Privacy: File and Folder Lock to protect selected locations www.Outpost.Pro
  • 38. Proactive Task Management Additional analysis/management tool:  Process activity monitor (Outpost’s Task Manager) www.Outpost.Pro
  • 39. PROACTIVE APPROACH 4. Ease of use Auto-Learn mode to remember typical activity to decrease user interaction after training period ImproveNet system for safe configurations auto-creation www.Outpost.Pro
  • 40. Outpost’s Firewall  Network access rules for every present application www.Outpost.Pro
  • 41. Outpost’s Firewall www.Outpost.Pro
  • 42. Outpost’s Web Control www.Outpost.Pro
  • 43. Outpost’s Anti-Spam  Plug-in for Outlook, Outlook Express, The BAT!, Vista, and Windows 7 Mail  Training wizard, white and black lists www.Outpost.Pro
  • 44. Specifications www.Outpost.Pro
  • 45. Outpost 7.5 Specifications www.Outpost.Pro
  • 46. Outpost 7.5 Compatibility Full-range supported Windows platforms: – regular 32-bit and 64-bit Windows: Windows 7 (including SP1), Vista (including SP1 and SP2), Windows XP (SP2 and higher), + Windows Server editions (both 32-bit and 64-bit): Windows Server 2003 (SP1 and higher), Windows Server 2008 (including 2008 R2). Supported email clients for anti-spam: The Bat!, Windows Mail, Outlook Express, Outlook (all versions). Supported email protocols & services: POP3, SMTP, IMAP. Compatibility mode for some 3-rd party anti-virus tools. www.Outpost.Pro
  • 47. Outpost 7.5 PC Requirements Minimal hardware requirements x86-/x64-/multi-core CPU, Starting from 450 MHz (Intel/AMD-compatible) and 256 MB RAM. Miminum 350MB free hard disk space (for Antivirus and Security Suite, Firewall – 200 MB hard disk space). www.Outpost.Pro
  • 48. Licensing Policy www.Outpost.Pro
  • 49. Licensing Policy Active license covers: Lifetime right to use software, free priority updates for software services, free technical support (email, web, online chat), free upgrade to major and minor releases. www.Outpost.Pro
  • 50. Prices for home users Single license (1 PC, any OS) Starting Starting Starting at $29.95 at $29.95 at $19.95 For 3 PCs For 1 PC For 1 PC Also available: Personal Pack (3 PC at 1 home), Family Pack (up to 5 home PCs) www.Outpost.Pro
  • 51. Prices for organizations Business license per 1 PC Starting Starting Starting at $29.95 at $49.95 at $39.95 Also available: Volume discount prices (1-4, 5-9, 10- 25 PCs, etc.) on request www.Outpost.Pro
  • 52. Prices for organizations Educational license per 1 PC For educational, academic and non-commercial institutions (discounts = 30 % OFF the business license price) Also available: Volume discount prices (1-4, 5-9, 10- 25 PCs, etc.) on request www.Outpost.Pro
  • 53. Discounts RENEWAL Discounts 40% OFF 40% OFF 50% OFF Also available: Lifetime support and upgrade license (only for Firewall for personal/home use) www.Outpost.Pro
  • 54. Discounts MIGRATION discounts OR => 40% OFF PLUS => FREE Also available: Single License -> Personal Pack upgrade Personal Pack -> Family License upgrade www.Outpost.Pro
  • 55. www.Agnitum.com Thank you for your time! Visit www.Agnitum.com now and download your free full-function 30-day copy! www.Outpost.Pro