Windows Antivirus Support Chart for Hostscan 3.1.06073 Product Name

Total Page:16

File Type:pdf, Size:1020Kb

Windows Antivirus Support Chart for Hostscan 3.1.06073 Product Name Windows Antivirus Support Chart for HostScan 3.1.06073 Marketing Product Data File Engine Live Version Check RTP Set RTP Language Alias Name Time Version Update Names 360Safe.co m 360 1.x ✔ ✔ ✔ ✔ ✔ English 360杀毒 Antivirus 360 3.x ✔ ✘ ✔ ✘ ✘ English Antivirus 360 Total 4.x ✔ ✔ ✔ ✘ ✘ English Security Chinese 360 360杀毒 1.x ✔ ✔ ✔ ✘ ✘ Simplified Antivirus Chinese 360 360杀毒 2.x ✔ ✔ ✔ ✘ ✘ Simplified Antivirus Chinese 360杀毒 3.x ✘ ✘ ✔ ✘ ✘ Simplified Chinese 360 360杀毒 4.x ✘ ✘ ✔ ✘ ✘ Simplified Antivirus Chinese 360 360杀毒 5.x ✘ ✘ ✔ ✘ ✘ Simplified Antivirus Other 360Safe.co x ✘ ✘ ✘ ✘ ✘ English m Antivirus AEC, spol. s r.o. TrustPort 2.x ✘ ✘ ✔ ✔ ✘ English Antivirus Other AEC, spol. s r.o. x ✘ ✘ ✘ ✘ ✘ English Antivirus Agnitum Ltd. Outpost Antivirus 7.x ✔ ✔ ✔ ✔ ✘ English Pro Outpost Antivirus 8.x ✔ ✔ ✔ ✔ ✘ English Pro Outpost Antivirus 9.x ✔ ✔ ✔ ✔ ✔ English Pro Outpost Outpost Security Antivirus 6.x ✔ ✔ ✔ ✔ ✘ English Suite Pro Pro 2009 2009 Outpost Security 7.x ✘ ✘ ✔ ✘ ✘ English Suite Free Outpost Security 7.x ✔ ✔ ✔ ✔ ✘ English Suite Pro Outpost Security 8.x ✔ ✔ ✔ ✔ ✔ English Suite Pro Outpost Security 9.x ✔ ✔ ✔ ✔ ✔ English Suite Pro Other Agnitum x ✘ ✘ ✘ ✘ ✘ English Ltd. Antivirus AhnLab, Inc. AhnLab Security 2.x ✔ ✔ ✘ ✔ ✘ English Pack AhnLab V3 Internet 7.x ✔ ✔ ✔ ✔ ✘ English Security 2007 AhnLab V3 Internet Security 7.x ✔ ✔ ✔ ✔ ✘ English 2007 Platinum AhnLab V3 Internet Security 7.x ✔ ✔ ✔ ✔ ✘ English 2008 Platinum AhnLab V3 Internet Security 7.x ✔ ✔ ✔ ✔ ✔ English 2009 Platinum AhnLab V3 Internet Security 7.0 7.x ✔ ✔ ✔ ✔ ✘ English Platinum Enterprise AhnLab V3 Internet 8.x ✔ ✔ ✔ ✔ ✔ English Security 8.0 AhnLab V3 Internet 9.x ✔ ✔ ✔ ✔ ✔ English Security 9.0 AhnLab V3 VirusBlock Internet 7.x ✔ ✔ ✘ ✔ ✘ English Security 2007 AhnLab V3 VirusBlock Internet Security 7.x ✔ ✔ ✔ ✘ ✔ English 2007 Platinum Enterprise V3 Click 1.x ✔ ✘ ✘ ✘ ✘ English V3 Lite 1.x ✔ ✔ ✔ ✔ ✔ Korean V3 Lite 3.x ✔ ✔ ✔ ✘ ✘ Korean V3 VirusBlock 6.x ✔ ✔ ✘ ✘ ✘ English 2005 V3 ウイルスブ NA ✔ ✔ ✘ ✔ ✘ Japanese ロック V3Pro 2004 6.x ✔ ✔ ✔ ✔ ✘ English Other AhnLab, x ✘ ✘ ✘ ✘ ✘ English Inc. Antivirus Aliant Aliant Business Security 6.x ✔ ✔ ✔ ✔ ✔ English Suite Anti- Virus Aliant Business Security 7.x ✔ ✔ ✔ ✘ ✔ English Suite Anti- Virus Aliant Security 7.x ✔ ✔ ✔ ✘ ✔ English Services Anti-Virus Gestionnair e de sécurité 6.x ✔ ✔ ✔ ✔ ✔ French Affaires d'Aliant Anti- Virus Gestionnair e de sécurité 7.x ✔ ✔ ✔ ✘ ✔ English Affaires d'Aliant Antivirus Gestionnair e de sécurité 7.x ✔ ✔ ✔ ✘ ✔ English d'Aliant Antivirus Other Aliant x ✘ ✘ ✘ ✘ ✘ English Antivirus ALLIT Service, LLC. Zillya Zillya! 1.x ✔ ✘ ✘ ✘ ✘ English Antivirus Antivirus Zillya Zillya! Internet 1.x ✔ ✘ ✘ ✘ ✘ English Internet Security Security Other ALLIT Service, x ✘ ✘ ✘ ✘ ✘ English LLC. Antivirus ALWIL Software avast! avast! Free 4.8.x ✔ ✘ ✔ ✔ ✘ English Antivirus Antivirus avast! Antivirus avast! Home 4.x ✔ ✘ ✔ ✔ ✘ English Antivirus Antivirus | avast! Free Antivirus avast! Antivirus 4.x ✔ ✘ ✔ ✔ ✘ English (managed) avast! Antivirus 4.8.x ✔ ✘ ✔ ✔ ✘ English Professiona l avast! avast! Antivirus Antivirus 4.x ✔ ✘ ✔ ✔ ✘ English Professiona Professiona l l Antivirus avast! Business 6.x ✔ ✘ ✔ ✔ ✔ English Protection avast! Business 6.x ✔ ✘ ✔ ✔ ✔ English Protection Plus avast! Endpoint 7.x ✔ ✘ ✔ ✔ ✔ English Protection avast! Endpoint 8.x ✔ ✘ ✔ ✔ ✔ English Protection avast! Endpoint 7.x ✔ ✘ ✔ ✔ ✔ English Protection Plus avast! Endpoint 8.x ✔ ✘ ✔ ✔ ✔ English Protection Plus avast! Endpoint 7.x ✔ ✘ ✔ ✔ ✔ English Protection Suite avast! Endpoint 8.x ✔ ✘ ✔ ✔ ✔ English Protection Suite avast! Endpoint 7.x ✔ ✘ ✔ ✔ ✔ English Protection Suite Plus avast! Endpoint 8.x ✔ ✘ ✔ ✔ ✔ English Protection Suite Plus avast! File Server 7.x ✔ ✘ ✘ ✔ ✘ English Security avast! Free avast! Free 2014.x ✔ ✘ ✔ ✘ ✘ English Antivirus Antivirus 2014 avast! Free avast! Free 2015.x ✔ ✘ ✔ ✔ ✔ English Antivirus Antivirus 2015 avast! Free 5.x ✔ ✘ ✔ ✔ ✘ English Antivirus avast! Free 6.x ✔ ✘ ✔ ✔ ✔ English Antivirus avast! Free 7.x ✔ ✘ ✔ ✔ ✔ English Antivirus avast! Free 8.x ✔ ✘ ✔ ✔ ✘ English Antivirus avast! Internet 5.x ✔ ✘ ✔ ✔ ✔ English Security avast! Internet 6.x ✔ ✘ ✔ ✔ ✔ English Security avast! Internet 7.x ✔ ✘ ✔ ✔ ✔ English Security avast! Internet 8.x ✔ ✘ ✔ ✔ ✘ English Security avast! avast! Internet Internet 9.x ✔ ✘ ✔ ✔ ✘ English Security Security 2014 avast! avast! 10.x ✔ ✘ ✔ ✔ ✘ English Premier Premier 2015 avast! 8.x ✔ ✘ ✔ ✔ ✘ English Premier avast! avast! 9.x ✔ ✘ ✔ ✔ ✘ English Premier Premier 2014 avast! Pro 5.x ✔ ✘ ✔ ✔ ✔ English Antivirus avast! Pro 6.x ✔ ✘ ✔ ✔ ✔ English Antivirus avast! Pro 7.x ✔ ✘ ✔ ✔ ✔ English Antivirus avast! Pro 8.x ✔ ✘ ✔ ✔ ✘ English Antivirus avast! Pro avast! Pro 9.x ✔ ✘ ✔ ✔ ✘ English Antivirus Antivirus 2014 avast! Server 4.x ✔ ✘ ✘ ✔ ✘ English Edition Other ALWIL x ✘ ✘ ✘ ✘ ✘ English Software Antivirus America Online, Inc. AOL Safety and Security 1.x ✔ ✔ ✔ ✘ ✔ English Center Virus Protection AOL Safety and Security 102.x ✔ ✔ ✔ ✘ ✘ English Center Virus Protection AOL Safety and Security 2.x ✔ ✔ ✔ ✘ ✔ English Center Virus Protection AOL Safety and Security 210.x ✔ ✔ ✔ ✘ ✘ English Center Virus Protection Kaspersky Active Virus 6.x ✔ ✘ ✔ ✔ ✘ English Anti-Virus Shield 6.0 Other America x ✘ ✘ ✘ ✘ ✘ English Online, Inc. Antivirus Antiy Labs Antiy Ghostbuste 6.x ✘ ✘ ✘ ✔ ✘ English rs Other Antiy Labs x ✘ ✘ ✘ ✘ ✘ English Antivirus Anvisoft Corporatio n Anvisoft Smart 1.x ✘ ✘ ✔ ✘ ✘ English Defender Other Anvisoft x ✘ ✘ ✘ ✘ ✘ English Corporation Antivirus ArcaBit ArcaVir ArcaVir Antivirus 11.x ✘ ✔ ✔ ✘ ✔ English Antivirus Protection 2011 ArcaVir ArcaVir 12.x ✘ ✔ ✔ ✔ ✔ English Antivirus Antivirus 2012 ArcaVir 2014.x ✔ ✔ ✔ ✘ ✘ English Antivirus ArcaVir ArcaVir Internet Internet 11.x ✘ ✔ ✔ ✔ ✔ English Security Security 2011 ArcaVir ArcaVir Internet Internet 12.x ✘ ✔ ✔ ✔ ✔ English Security Security 2012 ArcaVir Internet 2014.x ✔ ✔ ✔ ✘ ✘ English Security Arcabit Endpoint 2014.x ✔ ✔ ✔ ✘ ✘ English AntiVirus Arcabit Endpoint 2014.x ✔ ✔ ✔ ✘ ✘ English Security Other ArcaBit x ✘ ✘ ✘ ✘ ✘ English Antivirus Ashampoo GmbH & Co. KG Ashampoo Anti- 1.x ✔ ✘ ✔ ✔ ✘ English Malware Other Ashampoo GmbH & x ✘ ✘ ✘ ✘ ✘ English Co. KG Antivirus AT&T AT&T Internet Security 6.x ✔ ✔ ✔ ✔ ✔ English Suite AT&T Anti-Virus Other AT&T x ✘ ✘ ✘ ✘ ✘ English Antivirus Auslogics Software Pty Ltd Auslogics 15.x ✘ ✘ ✔ ✘ ✘ English Antivirus Other Auslogics Software x ✘ ✘ ✘ ✘ ✘ English Pty Ltd Antivirus Authentium , Inc. Command Anti- 5.x ✔ ✘ ✘ ✔ ✘ English Malware Command Anti-Virus 4.x ✔ ✔ ✔ ✔ ✘ English Enterprise Command AntiVirus 4.x ✔ ✔ ✔ ✔ ✘ English for Windows Command AntiVirus for 4.x ✔ ✔ ✔ ✔ ✘ English Windows Enterprise Cox High Speed Internet 3.x ✔ ✔ ✔ ✔ ✔ English Security Suite Other Authentium x ✘ ✘ ✘ ✘ ✘ English , Inc. Antivirus Avanquest Publishing USA, Inc. Double Anti-Spy 2.x ✘ ✔ ✔ ✘ ✘ English Profession al SystemSuit SystemSuit e 11.x ✔ ✘ ✔ ✘ ✔ English e Professiona l Other Avanquest Publishing x ✘ ✘ ✘ ✘ ✘ English USA, Inc. Antivirus Avetix Avetix 2.x ✔ ✔ ✔ ✘ ✘ English Other Avetix x ✘ ✘ ✘ ✘ ✘ English Antivirus AVG Technologi es AVG Internet Security 2011 | AVG Anti-Virus 2011 | Anti- AVG 10 10.x ✔ ✘ ✔ ✔ ✔ English Virus [AntiVirus] Business Edition 2011 | AVG Premium Security 2011 AVG Internet Security 8.0 | AVG Anti- Virus 8.0 | AVG Anti- AVG 8.0 8.x ✔ ✘ ✔ ✔ ✔ English Virus plus [AntiVirus] Firewall 8.0 | AVG Anti- Virus 8.5 | AVG Internet Security 8.5 AVG Internet Security | AVG Internet Security AVG 9 9.x ✔ ✘ ✔ ✔ ✔ English Business [AntiVirus] Edition | AVG Anti- Virus plus Firewall | AVG Anti- Virus AVG Anti- AVG Anti- Virus Free 10.x ✔ ✘ ✔ ✔ ✔ English Virus Free Edition 2011 AVG Free 8.0 | AVG Anti-Virus AVG Anti- 8.x ✔ ✘ ✔ ✔ ✔ English Free Virus Free Edition | AVG Free 8.5 AVG Anti- 9.x ✔ ✘ ✔ ✔ ✔ English Virus Free AVG Anti- AVG Anti- Virus Free Virus Free 2012.x ✔ ✘ ✔ ✔ ✔ English Edition Edition 2012 AVG Anti- AVG Anti- Virus Free Virus Free 2013.x ✔ ✔ ✔ ✔ ✔ English Edition Edition 2013 AVG Anti- AVG Virus Free 2014.x ✔ ✔ ✔ ✔ ✔ English AntiVirus Edition FREE 2014 AVG Anti- AVG Virus Free 2015.x ✔ ✔ ✔ ✔ ✔ English AntiVirus Edition FREE 2015 AVG Internet Security 2012 | AVG Anti-Virus | AVG 2012.x ✔ ✘ ✔ ✔ ✔ English AVG Anti- AntiVirus Virus 2012 | AVG Premium Security 2012 AVG Anti- Virus | AVG Anti-Virus AVG 2013 | AVG 2013.x ✔ ✔ ✔ ✔ ✔ English AntiVirus AntiVirus Business Edition 2013 AVG AVG 2014.x ✔ ✔ ✔ ✔ ✔ English AntiVirus AntiVirus 2014 AVG AVG 2015.x ✔ ✔ ✔ ✔ ✔ English Antivirus AntiVirus 2015 AVG CloudCare 2013.x ✔ ✔ ✔ ✔ ✔ English Antivirus AVG CloudCare 2014.x ✔ ✔ ✔ ✔ ✔ English Antivirus AVG Internet 2012.x ✔ ✔ ✔ ✔ ✔ English Security AVG Internet AVG Security Internet 2013.x ✔ ✔ ✔ ✔ ✔ English Business Security Edition 2013 AVG Internet 2014.x ✔ ✔ ✔ ✔ ✔ English Security AVG AVG Internet Internet 2015.x ✔ ✔ ✔ ✔ ✔ English Security Security 2015 AVG AVG Premium Premium 2013.x ✔ ✔ ✔ ✔ ✔ English Security Security 2013 AVG AVG Premium Premium 2014.x ✔ ✔ ✔ ✔ ✔ English Security Security 2014 Other AVG Technologi x ✘ ✘ ✘ ✘ ✘ English es Antivirus Avira GmbH Avira AntiVir Personal - 10.x ✔ ✔ ✔ ✔ ✔ English Free Antivirus Avira AntiVir Personal - 9.x ✔ ✔ ✔ ✔ ✔ English Free Antivirus Avira AntiVir Personal – 8.x ✔ ✔ ✔ ✔ ✔ English Free Antivirus Avira AntiVir PersonalEd 7.x ✔ ✔ ✔ ✔ ✔ English ition Classic Avira AntiVir PersonalEd 7.x ✔ ✔ ✔ ✔ ✔ English ition Premium Avira AntiVir 10.x ✔ ✔ ✔ ✔ ✔ English Premium Avira AntiVir 8.x ✔ ✔ ✔ ✔ ✔ English Premium Avira AntiVir 9.x ✔ ✔ ✔ ✔ ✔ English Premium Avira AntiVir 10.x ✔ ✔ ✔ ✔ ✔ English Professiona l Avira AntiVir 8.x ✔ ✔ ✔ ✔ ✔ English Professiona l Avira AntiVir 9.x ✔ ✔ ✔ ✔ ✔ English Professiona l Avira AntiVir 10.x ✔ ✔ ✔ ✔ ✘ English Server
Recommended publications
  • A Simple Malware Test Environment
    International Journal of Computer and Information Technology (ISSN: 2279 – 0764) Volume 02– Issue 04, July 2013 A Simple Malware Test Environment Sam Lundie and Daniel Rolf School of Computing and Information Systems University of Tasmania Launceston, Tasmania, Australia e-mail: {slundie, Daniel.Rolf} @utas.edu.au Abstract— Malware does not need to compromise the operating not-present fraud increased by 38% for the calendar year system kernel in order to provide an untrustworthy browsing 2010, with 35.6 cents in every $1,000 dollars falling victim experience for the user. This paper describes a simple, virtual to fraud [1]. However, similar figures for fraud perpetrated machine-based, malware test environment built using freeware against Online Banking are much harder to obtain as banks and open source software. The system was designed to allow are seemingly reluctant to divulge loss figures. The the high-level behaviour of a piece of malware to be studied quickly and conveniently by monitoring network, process and Symantec Corporation has claimed that cybercrime has file activity. The system proved effective when trialled against surpassed illegal drug trafficking as a criminal money- different samples of the well-known malware Zeus and was maker [2]. verified further by tests conducted with the commercially available anti-malware products PC-Tools and Trusteer. It has been estimated that Zeus is guilty of approximately Although tests were conducted with variants of the Zeus 44% of all banking malware infections [3]. In August 2009 malware, the techniques discussed in this paper are equally Gunter Ollmann the VP for research at Damaballa [4] applicable to any other malware and can be used to quickly positioned the Zeus malware as the number one botnet assess the effectiveness of potential anti-malware solutions.
    [Show full text]
  • Personal Firewalls Are a Necessity for Solo Users
    Personal firewalls are a necessity for solo users COMPANY PRODUCT PLATFORM NOTES PRICE Aladdin Knowledge Systems Ltd. SeSafe Desktop Windows Combines antivirus with content filtering, blocking and $72 Arlington Heights, Ill. monitoring 847-808-0300 www.ealaddin.com Agnitum Inc. Outpost Firewall Pro Windows Blocks ads, sites, programs; limits access by specific times $40 Nicosia, Cyprus www.agnitum.com Computer Associates International Inc. eTrust EZ Firewall Windows Basic firewall available only by download $40/year Islandia, N.Y. 631-342-6000 my-etrust.com Deerfield Canada VisNetic Firewall Windows Stateful, packet-level firewall for workstations, mobile $101 (Canadian) St. Thomas, Ontario for Workstations users or telecommuters 519-633-3403 www.deerfieldcanada.ca Glucose Development Corp. Impasse Mac OS X Full-featured firewall with real-time logging display $10 Sunnyvale, Calif. www.glu.com Intego Corp. NetBarrier Personal Firewall Windows Full-featured firewall with cookie and ad blocking $50 Miami 512-637-0700 NetBarrier 10.1 Mac OS X Full-featured firewall $60 www.intego.com NetBarrier 2.1 Mac OS 8 and 9 Full-featured firewall $60 Internet Security Systems Inc. BlackIce Windows Consumer-oriented PC firewall $30 Atlanta 404-236-2600 RealSecure Desktop Windows Enterprise-grade firewall system for remote, mobile and wireless users Varies blackice.iss.net/ Kerio Technologies Inc. Kerio Personal Firewall Windows Bidirectional, stateful firewall with encrypted remote-management option $39 Santa Clara, Calif. 408-496-4500 www.kerio.com Lava Software Pty. Ltd. AdWare Plus Windows Antispyware blocks some advertiser monitoring but isn't $27 Falköping, Sweden intended to block surveillance utilities 46-0-515-530-14 www.lavasoft.de Network Associates Inc.
    [Show full text]
  • Hostscan 4.8.01064 Antimalware and Firewall Support Charts
    HostScan 4.8.01064 Antimalware and Firewall Support Charts 10/1/19 © 2019 Cisco and/or its affiliates. All rights reserved. This document is Cisco public. Page 1 of 76 Contents HostScan Version 4.8.01064 Antimalware and Firewall Support Charts ............................................................................... 3 Antimalware and Firewall Attributes Supported by HostScan .................................................................................................. 3 OPSWAT Version Information ................................................................................................................................................. 5 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.890.0 for Windows .................................................. 5 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.890.0 for Windows ........................................................ 44 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.824.0 for macos .................................................... 65 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.824.0 for macOS ........................................................... 71 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.730.0 for Linux ...................................................... 73 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.730.0 for Linux .............................................................. 76 ©201 9 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
    [Show full text]
  • 2016 SIEM Content and Parsing Updates Table of Contents
    2016 SIEM Content and Parsing Updates Table of Contents Table of Contents 2 SIEM Data Sources 5 January 21, 2016 5 February 10, 2016 5 February 16, 2016 5 February 26, 2016 5 March 25, 2016 5 June 2, 2016 6 June 8, 2016 6 July 19, 2016 6 August 04, 2016 6 August 11, 2016 6 August 15, 2016 6 September 1, 2016 6 September 2, 2016 7 September 26, 2016 7 October 12, 2016 7 October 13, 2016 7 November 7, 2016 7 November 10, 2016 8 November 11, 2016 8 December 2, 2016 8 SIEM Custom Types 9 October 13, 2016 9 October 25, 2016 9 SIEM Parsing Rules 10 January 8, 2015 10 January 12, 2016 10 January 13, 2016 10 January 21, 2016 10 January 22, 2016 11 January 25, 2016 11 January 29, 2016 11 January 29, 2016 11 February 4, 2016 11 February 8, 2016 12 February 10, 2016 12 February 11, 2016 12 February 16, 2016 12 February 17, 2016 12 February 19, 2016 13 February 23, 2016 13 February 24, 2016 13 February 25, 2016 13 February 26, 2016 13 February 29, 2016 14 March 2, 2016 14 March 3, 2016 14 March 7, 2016 15 March 8, 2016 15 March 9, 2016 15 March 11, 2016 15 March 14, 2016 15 March 16, 2016 15 March 17, 2016 16 March 18, 2016 16 March 21, 2016 16 March 24, 2016 17 March 25, 2016 17 March 29, 2016 17 March 30, 2016 18 March 31, 2016 18 April 01, 2016 18 April 04, 2016 18 April 07, 2016 18 April 08, 2016 18 April 21, 2016 18 2 April 26, 2016 19 May 3, 2016 19 May 5, 2016 19 May 5, 2016 19 May 9, 2016 19 May 11, 2016 19 May 16, 2016 19 May 18, 2016 19 May 23, 2016 19 May 24, 2016 20 May 25, 2016 20 May 26, 2016 21 May 27, 2016 21 June 2, 2016 21 June 06,
    [Show full text]
  • Secureworks Corp. (Exact Name of Registrant As Specified in Its Charter)
    UNITED STATES SECURITIES AND EXCHANGE COMMISSION WASHINGTON, D.C. 20549 FORM 10-K (Mark One) ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES þ EXCHANGE ACT OF 1934 For the fiscal year ended February 3, 2017 or TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES o EXCHANGE ACT OF 1934 For the transition period from to Commission file number: 001-37748 SecureWorks Corp. (Exact name of registrant as specified in its charter) Delaware 56-2015395 (State or other jurisdiction of (I.R.S. Employer incorporation or organization) Identification No.) One Concourse Parkway NE Suite 500, Atlanta, Georgia 30328 (Address of principal executive offices) (Zip Code) Registrant’s telephone number, including area code: (404)327-6339 Securities registered pursuant to Section 12(b) of the Act: Title of each class Name of each exchange on which registered Class A Common Stock, par value $0.01 per share The NASDAQ Stock Market LLC (NASDAQ Global Select Market) Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes o No R Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act. Yes o No R Indicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days.
    [Show full text]
  • A Glance Into the Eye Pyramid Technical Article V2
    A glance into the Eye Pyramid RĂZVAN OLTEANU Security Reasercher We keep you safe and we keep it simple. 01 Introduction On January 11, 2017 Italian news agency AGI, published a court order regarding cyber-attacks against high ranking Italian government members and Italian institutions. The attacks were conducted by two Italian brothers to get financial information that would help them gain an advantage when trading on financial markets. Overview The campaign was carried out over several years starting in 2008 and continuing into 2010, 2011, 2012 and 2014. The mechanism the brothers used to distribute their malware was simple; targeted spear-phishing emails aimed at victims who had already been selected. The emails con- tained a malware attachment, which once opened harvested information from the victims’ computers. This information consisted of pictures, documents, archives, presenta- tions, email contacts, email bodies, usernames, passwords, keystrokes, web pages content and databases. Technical details The malware was written in VisualBasic.net and was obfuscated twice using common obfuscators: Dotfuscator and Skater .NET which can be easily reversed. The malware stored its sensitive data – license keys, URLs and paths – by encrypting with the Triple DES algorithm using the MD5 of a provided password as key and SHA256 of the pass- word as initialization vector. A glance into the Eye Pyramid 01 02 Figure 1 Security applications To remain unnoticed, it tried to disable any security application installed on the victim’s computer. Targeted
    [Show full text]
  • K7 Endpoint Security
    DATA SHEET K7 Endpoint Security STANDARD EDITION Cyber security is an important operational requirement for any business today – no matter how large or small the company. The effects of a targeted malware attack can bring a business to Key Features its knees, negatively affecting an organization’s efficiency and incurring lost productivity from the workforce. • Low cost, high performance endpoint Protecting a company’s intellectual property and securing customer data are good business protection and prevention for small practices, however, the cost of deploying, managing, and maintaining commercial IT management and medium businesses and security controls can be extremely expensive for an up and coming business. For IT Operations • Detect and mitigate real-world in small and medium businesses, price and performance are just as important as high detection threats such as viruses, spyware, rates and threat mitigation features – without compromising the overall security of the network. ransomware and phishing attacks Cost Effective Anti-Malware Solutions • Granular Firewall with integrated HIDS to block targeted system level Many enterprise-class malware solutions suffer from bloated features and functionality that attacks smaller organizations do not need and rarely use. K7 Endpoint Security provides small to medium businesses with cost-effective anti-malware capabilities - without the high purchase price, complex • Optimized performance and small deployment models, or expensive renewal and maintenance costs found in other vendor solutions. memory footprint extends the useful Available in both Standard and Advanced editions, K7’s Endpoint Security supports centralized life of older systems management models to simplify deployment, streamline IT operations, and meet both internal and • Flexible on-premise or Cloud-based external compliance requirements.
    [Show full text]
  • Firewall Software for Windows Xp
    Firewall software for windows xp Windows Free Download. Windows 10/8/7, Vista and XP. Block unwanted traffic. Become "ZoneAlarm remains an Editor's Choice for firewall protection. It does. The best protection for Windows XP. Select the antivirus protection that suits you best: ZoneAlarm Pro Antivirus & Firewall for XP, Download >. ZoneAlarm. COMODO offers Free Firewall download for Windows. A multi-layered Live Expert help; Firewall Protection; Antivirus Software 10 / 8 / 7 / Vista / XP SP2. Get award winning free firewall software from Comodo. Download World's #1 Free Firewall that finds threats and protects your PC Supported OS: XP 32bit, Vista/Win7/Win8/Win/Win10 32 bit & 64 bit / MB RAM / MB space. License: Free; OS: Windows XP Windows Vista Windows Windows Windows 10 Firewall Control is a program that has been developed by. Windows 10 Firewall Control is a program that has been developed by License: Free; OS: Windows XP Windows Vista Windows 7 Windows 8. The firewall that Microsoft introduced with the Windows XP SP2 service pack provides a basic level of protection from external attacks: it blocks. AVS Firewall works in Windows 8, 7, Vista, and XP. Note: During setup, AVS Firewall will install their registry cleaner software if you don't deselect it manually. Freeware - Download free Firewall software programs. OS: Windows XP//Vista//7, Linux, MacOS. In: Security/Privacy >. If you are using Windows 7 or Windows 8, you can use the built-in Windows firewall program. Windows XP and Vista firewall was not that great but Microsoft has. Windows has an effective built-in firewall, your home network adds that included firewall protection goes all the way back to Windows XP? Firewall programs to protect your PC.
    [Show full text]
  • Fortios 6.2 Data Sheet
    DATA SHEET FortiOS™ 6.2 Fortinet’s Security Operating System FortiOS enables the Fortinet Security Fabric, allowing organizations to readily achieve a security-driven network with one intuitive operating system. FortiOS 6.2, the latest version of Fortinet’s security operating system, powers the entire Security Fabric, helping customers reduce and manage the attack surface, prevent advanced threats, and reduce complexity from Internet of Things (IoT) devices to the cloud. Broad Visibility Highlights — What’s New Achieve full visibility across multi-cloud and branch § Spilt-task VDOM environments with SD-WAN, native cloud and virtual connectors, and intent-based segmentation. § Expanding product Integration with Security Fabric § New SDN and Threat Feed Connectors Integrated AI-driven Breach Prevention § SD-WAN Rule Definition and VPN Stop threats quickly and detect active intrusions and Setup Enhancements bad actors across the entire Security Fabric with § Extending Public Cloud Support integrated AI-driven intelligence capabilities combined § Additional Triggers and Actions with advanced, leading-edge technologies. § Flow-based security profile Improvements § MAC Address Objects § Consolidated risk View on Automated Operations, Orchestration, Topology Map and Response § FortiSandbox Cloud Region Reduce complexity and costs with rapid orchestrated Selection threat response, automated workflows, and § Policy Setup and Visibility automated auditing and compliance. Upgrades DATA SHEET | FortiOS™ 6.2 Overview Introducing FortiOS 6.2 increasing digital connectedness of organizations is driving the requirement for a security transformation, where security is integrated into applications, devices, and cloud networks to protect business data spread across these complex environments. FortiOS™ 6.2 delivers hundreds of new features and capabilities that were designed to provide the broad visibility, integrated threat intelligence, and automated response required for digital business.
    [Show full text]
  • Accomplished and Certified IT Security Professional with Experience Assisting Organizations Successfully Complete Enterprise-Wide Security Projects
    ROHIT BANKOTI Accomplished and certified IT security professional with experience assisting organizations successfully complete enterprise-wide security projects. Experience in finance, technology, healthcare, telecom industries and a proven track record of streamlining security processes, design and implement efficient security solutions, lead and assist multi-disciplined, multi-national teams in achieving security efficiency. Professional Qualifications: • Degree Bachelor of Technology (Computer Science ) • CGPA 6.36/10 • Institute University Institute of Engg. & Tech. (MDU), Rohtak Academic Qualifications: • Completed XII standard from Hamdard Public School (CBSE) in with 79% • Completed X standard from Amrita Public School (CBSE) in with 81% CERTIFICATIONS • Sophos Certified Architect for UTM by RED Education. • Sophos Certified Engineer for Endpoint, MDM, Email protection, Encryption. • GFI (Languard, FAX maker, Mail essential & Cloud, Endpoint security • CEH version 7 training from net hub. • ECSA (E-council) 412-79 complete training from net hub. • Smooth Wall Certified engineer and Operator Certified. • McAfee certified for McAfee VSE, EPO, Mobile Management, HIPS and Mail. • Symantec Partner certification and Advanced Threat Protection. • Certified Information Security and Ethical hacking (C.I.S.E) from innobuzz. • Infowatch (DLP) training on endpoint and network level. • Qualys Vulnerability Expert. • C++ and .NET certification from Aptech, South Extension (Delhi) Professional Synopsis: Currently:- Working with Mckinsey & Company, Gurgaon, India as Security Engineer. - Mainly working with ATP projects. - Anti-phishing program - Other Operations 2015 to 2016 with CSC (Computer Science & Corporation), Noida - Sandboxing and Malware clean-up process - Identify Malware Domain and Phishing Attack vector. • Dec 2014 to Aug 2015 with ASIT, Delhi as Security Consultant. Working as UTM, SIEM, MDM and DLP architect.
    [Show full text]
  • Endpoint Integrity Check\221\316\211\236\210\352\227\227.Xlsx
    エンドポイントインテグリティチェック - アンチウイルス対応メーカ一覧 360safe.com AEC, spol. s r.o. ALWIL Software AT & T AVG Technologies Agnitum Ltd AhnLab, Inc. Aliant America Online, Inc. Antiy Labs Authentium, Inc. Avanquest Publishing USA, Inc. Avira GmbH Beijing Rising Technology Corp. Ltd. Bell Bell Aliant BellSouth Bitdefender BullGuard Ltd. CJSC Returnil Software CMC Information Security Cat Computer Services Pvt. Ltd. Central Command , Inc. Check Point, Inc Cisco Systems, Inc. ClamAV ClamWin Comodo Group Computer Associates International, Inc Coranti, Inc Crawler LLC Cyber Defender Corp. Defender Pro LLC ESTsoft Corp. EathLink, Inc Emsi Software GmbH Eset Software F-Secure Corp. FairPoint Faronics Corporation Fortinet, Inc Frisk Software International GData Software AG GFI Software Grisoft, Inc. H+BEDV Datentechnik GmbH HAURI, Inc IKARUS Software GmbH Internet Security Systems, Inc. Jiangmin, Inc K7 Computing Pvt. Ltd. kaspersky Labs Kingsoft Corp. LANDesk Software, Ltd. Lavasoft, Inc. Lumension Security McAfee, Inc. MicroWorld Microsoft Corp. N-able Technologies Inc Nano Security New Technology Wave Inc. Norman ASA ONO Omniquad PC Tools Software PCSecurityShield Panda Software Parallels, Inc. Preventon Technologies Ltd. Prevx Ltd. Quick Heal Technologies (P) Ltd. Radialpoint Inc. Rogers SOFTWIN SalD Ltd. Security Coverage Inc. Sereniti, Inc. Shavlik Technologies Sophos, Plc Sunbelt Software Symantec Corp. TELUS Thirtyseven4, LLC. Tobit.Software Trend Micro, Inc. Troppus Software Corporation TrustPort, a.s. VCOM VMware, Inc. Verizon Videotron Virgin Broadband Virgin Media Virus BlokAda Ltd. Virus Buster Ltd. Webroot Software, Inc Yahoo!, Inc Zone Labs LLC e frontier, Inc. eEye Digital Security iolo technologies, LLC.
    [Show full text]
  • EXABEAM SECURITY MANAGEMENT PLATFORM INTEGRATIONS Inbound Data Sources for Log Ingestion and Service Integrations for Incident Response
    EXABEAM SECURITY MANAGEMENT PLATFORM INTEGRATIONS Inbound Data Sources for Log Ingestion and Service Integrations for Incident Response The more data sources you have in your security incident and event management (SIEM), the better equipped you are to detect attacks. And the more security orchestration and automation response (SOAR) connections you have between your SIEM and your IT and security systems the quicker LIMITLESS SCALE WITH FLAT, PREDICTABLE PRICING you can respond. Every log and every security event matters. Not retaining your log data can create security blinds spots that prevent Exabeam Security Management Platform (SMP) has compliance or leave your organization vulnerable to attack. approximately 350 integrations with IT and security products Exabeam is designed to scale without penalizing you for the to help your analysts work smarter - providing inbound amount of data you ingest. Our flat pricing model is based integrations with data sources from vendors to easily on the number of users and devices in your environment, allow you to ingest as much data as possible; and SOAR not data volume. integrations with 3rd party vendors to help you automate and orchestrate your security response. CENTRALIZED SECURITY AUTOMATION AND ORCHESTRATION WITH 3RD PARTY INTEGRATIONS EXTENSIVE DATA SOURCES Exabeam Incident Responder integrates with approximately Exabeam ingests data from approximately 300 different 70 third party IT and security products. These integrations IT and security products to provide security analysts with help your analysts to gather evidence and attach them as the full scope of events. Exabeam Data Lake, Exabeam artifacts to incidents or quarantine affected users and assets Advanced Analytics and Exabeam Entity Analytics ingest logs until incidents are mitigated.
    [Show full text]