![]() ![]() Kaspersky Anti-Virus 6.0 for Windows Servers Enterprise Edition protects data on servers running under the Microsoft Windows family of operating systems (including 圆4 versions) from all types of malicious programs. Centralized installation and administration.iSwift and iChecker scanning optimization technologies.Proper protection of the file server not only ensures that users and their important information are protected, but also eliminates the danger of viruses making their way into backup copies of files, which may cause repeated virus outbreaks and other incidents. Kaspersky® Anti-Virus for File Server reliably protects servers running under Microsoft Windows, Novell NetWare, Linux and Samba from malicious programs including viruses, Trojans, spyware and more.Īntivirus protection for shared file storage areas is essential, since a single infected file on the server may infect the workstations of all users of the resource. By taking this approach and considering all options, the enterprise is able to define its own requirements, tools, and practices for endpoint security and achieve its own goals to secure the extended network. To achieve the goal, each enterprise has to determine its own best practices to meet business goals and regulatory requirements. ![]() In reality, endpoint security is both an enterprise goal and an enterprise practice. Since endpoints are now a primary target of these threats, enterprises are forced by necessity to confront Endpoint security as a core business issue. Endpoints are where the typical enterprise conducts most of its business, and disruption to endpoints is a huge impact to enterprises in terms of cost and lost productivity. These vulnerabilities include the familiar, such as buffer overruns the more insidious, such as keystroke-loggers and instant-messaging worms and the most recent, such as vulnerabilities in the security software itself.Įnterprises end up with extreme vulnerability to a bewildering array of threats that increase each day. These threats take advantage of a growing number and variety of endpoint vulnerabilities. The growing number and variety of threats to endpoints, as well as threats that use endpoints as a vector, has made endpoint security a “hot topic.” Current threats include viruses, Trojans, worms, the use of endpoints as DDoS zombie hosts, and spyware. Also, Endpoint Security logically extends to the management and administration of these security measures, as well as to the risk, reporting, and knowledge management of the state and results of these measures. These measures include assessing risk to protect endpoints, such as with client antivirus and personal firewall, and protecting the network from the endpoints themselves, such as with quarantine and access control. The technology supports limited number of formats ( exe, dll, lnk, ttf, inf, sys, com, chm, zip, rar).Endpoint Security is the sum total of the measures taken to implement security concerning endpoints.The technology cannot process large files, because calculating the checksum for it takes longer than scanning the file.The technology uses the features of the Windows operating system to optimize the first scan of startup objects during the first scan task since the application installation.iChecker also checks such objects as email attachments and startup objects.The file is not scanned again if it was moved to a different folder because its checksum does not change.The algorithm also takes into account antivirus databases release date and the date when the scan settings have been changed. If the checksums match, the file is excluded from the scan scope. The application checks it for viruses once again. If the checksums are different, then the file has been changed. The iChecker technology saves the information about changed checksums to a special chart and compares the current checksum with the earlier one. When the file is modified, the checksum changes as well. ![]() A checksum is a digital signature of a file which helps to identify it as genuine. The iChecker technology calculates and remembers checksums for scanned objects. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |