Anti-Malware

Anti-Malware

 

MULTI-LAYERED

 

ANTI-MALWARE

 

The Network Box Anti-Malware system provides 16 anti-malware engines, running over 12 million signatures, to identify and prevent viruses, trojans, worms and other malicious software, from infecting your networked systems or networked smart devices.

 

Additionally, the anti-malware system transparently scans and analyzes incoming and outgoing SMTP emails, HTTP and FTP protocols for malware. Even attachments such as .exe.zip files, and other compression and encoding formats are decoded and scanned. Furthermore, external emails from POP3 and IMAP accounts are also scanned to ensure your network is secured.

 

The malware signature database that powers the anti-malware system is updated in real-time, using Network Box's patented PUSH Technology.

 

 

 

Anti-Malware

Engines

 

Crypto Hash Checks

Compares each object in the message with a database of malicious object signatures.

 

Regular Expression Checks

Uses regular expressions to look for common malicious code structures.

 

Illegal MIME

Looks for illegal structures and formatting in MIME email messages.

 

Kaspersky Message Scanner

Used to run the Kaspersky AVP anti-virus scanner against the entire message.

 

Kaspersky Object Scanner

Used to run the Kaspersky AVP anti-virus scanner against unpacked objects found inside the email message.

 

Clam Object Scanner

Used to optionally run the Clam anti-virus scanner against unpacked objects found inside the email message.

 

Bagle Variant Heuristics

Used to block new, emerging, variants of the Bagle family of viruses.

 

 

Hidden Executable Heuristics

Used to determine if executable code is hiding in non-executable file extensions.

 

Class ID Heuristics

Checks CLASSID extensions in attached files, as this is a common technique used to bypass anti-virus scanning, or exploit mail reader vulnerabilities.

 

Blank Extension Heuristics

Checks file extensions, looking for certain types of blank extension commonly used to bypass anti-virus scanning, or exploit mail reader vulnerabilities.

 

Multiple Extension Heuristics

Checks for certain classes of multiple extensions, commonly used to bypass anti-virus scanning, or exploit mail reader vulnerabilities.

 

Z-Scan

An in-the-cloud defense shield that provides fast and effective protection against emerging zero-day malware.

 

 

Malware engines info

 

 

Key Features

Engines and Singnatures

16 Engines

12,000,000+ Malware Signatures*

100% Triple Tolly rating

Triple 100% Tolly Group detection rating against their Extended Wildlist Malware database over HTTP, SMTP and POP3 protocols.

Mobile malware protection

Anti-mobile malware protection.

 

 

*For more information and real-time statistics:

Go to Security Response site



360老快3开奖结果 做希芸坐家就赚钱 广场泡泡秀能赚钱吗 风暴魔域手游赚钱 下载微乐宁夏麻将 买股票成功赚钱的窍门 做保险销售赚钱的人占比 英雄杀三足鼎立怎么玩 360插件赚钱 万国彩票首页 表面光鲜不赚钱行业 哈尔滨麻将免费下载 版纳开民宿赚钱吗 聊城做什么赚钱 繁星国际群 赚钱平台用模拟器可以吗 欢乐麻将好友房怎么玩