Protegent 360 Complete Security Antivirus Software
As the name suggests, Protegent 360 Complete Security Software has been designed to provide 360 degree security to protect business, data, child and laptops. Protegent 360 secures your computer from viruses, internet threats and protect your business as well as data from unauthorized access and theft through Protegent Total Security. Protegent 360 Complete Security Antivirus comes with its most advanced and unique features including Port Locker, Activity Reporter, Laptop tracking, SYS boost and Crash Proof.
Protegent 360 also works as parenting software tool by providing your child’s complete activity details on computer and the Internet via e-mail, enabling parents to guide the child in the right direction through its Activity Reporter Module.
Protegent 360 also provides a special feature of laptop tracking for users, which enable them to continuously track the laptop’s location. If a laptop is lost or stolen, Protegent 360 will track the location of the laptop via the internet and if not connected to the internet, it will encrypt your important data making it unreadable for others.
Port Locker module of Protegent 360 protects your data from unauthorized access and theft. It prevents data/file transfer through any port without your authorization or permission.
Crash Proof module of Protegent 360 once installed can recover all lost/deleted files. It also un-format accidentally or intentionally formatted drive.
Sysboost modules of Protegent 360 help in enhancing system speed by removing unwanted registry entries. Its disk defragmenter tool helps in accessing larger files faster. Data wiping module permanently deletes the files and makes them unrecoverable even for the experts like us.
Brochure Whitepaper Download Buy Online
Features
TOTAL SECURITY
- Advanced Cloud Protection Technology: Protegent cloud protection constantly updates the database for the latest threats which in turn provide maximum protection and also improves the performance of your PC. Protegent is the best antivirus software which now incorporates cloud protection technology.
- Absolute Malware Prevention: Malware are constantly monitored, if detected they are removed from the PC.
- Antiphishing: Abolishes suspicious and ambiguous Web domains and it prevents phishing.
- One Click Virus Removal: Protegent Antivirus removes all Virus, Spyware, Trojan, Worm, Malwares, and other kinds of PC threats.
- Entertainment Mode: Game Mode temporarily modifies protection settings. It minimizes their impact on system performance.
- Hourly update: Protegent Antivirus software takes updates every hour and protects our system from new viruses.
- Website & Ad Blocking: Blocks website & Ad on the basis of Keywords and Name as defined by the user.
- Personal Data filter: Prevents critical data, such as your social security number, from leaving your computer.
- Password Manager: Protegent Password Manager prevents your passwords from getting stolen by cyber criminals.
- Setting Protection: Setting protection feature helps you to protect your settings with a password, So that no one can change or modify the settings even if the other user has the admin rights.
- Stops Malware Intrusions: Any access of malware is invariably monitored as well as controlled in the PC. If any type of threat is sensed, henceforth, it is removed from the system.
- Antispam: Antispam feature helps in avoiding mail spam and encourages mail boxes free of disturbing mail trash. A “Personalized” option is offered that enables a user to insert personal definition of Spam.
- Anti-Theft Solution: Personal information is protected now as there is a Block ID function and USB blocking feature. Individuals can also define a list of trusted sites and forbid data theft.
- Get pardoned from obnoxious Web navigation: Now surf the Internet without succumbing into E-threat
- USB Block: Combats or blocks USB device auto-run vulnerability and you can also blocks USB access.
- Self-protected Software: Protegent Total Security cannot be disabled or controlled from any external attacks.
- Proficiency Optimization: This solution supports in maximizing the operating performance as offers highest speed of analysis and immediate answer to the attacks without demanding much of attention.
ACTIVITY REPORTER
- Captures Application activity, Internet activity, Clipboard, Keystrokes, Screenshots, Working log of clients.
- With the help of application monitor time log can be maintained for specific applications.
- Unique feature of blacklist and white list application
- Blacklist: Applications and websites that are added will get captured and be visible in alert.
- White list: No alert will be generated of the application and website added in the white list.
- Option to select the level of tracking.
- Send the reports to a specific email address or upload to an FTP location.
- Password protected so only authorized person can access the reports. Runs in Absolutely invisible mode.
- Records contents of password protected web pages, including Web Mail messages.
- Monitors all users on a PC, even if you don't know their passwords.
- Monitors Windows Clipboard activities like copy and cut.
- Monitors computer activity only when user goes online (optional).
- Setting of report log size (Min 1 MB to Max 5 MB).
- Captures ICQ, Miranda, Skype, Google Talk, MSN, AIM, AOL, Yahoo, QIP chats.
- Detection and notification of the custom keywords (alerts).
- Reports of Application activity, Clipboard activity, working log, Internet activity, Keystrokes, Screenshots all in HTML format.
- Intercepts DOS-box and Java-chat keystrokes.
- Invisible in the Windows startup list.
PORT LOCKER
- Proactive protection against data theft.
- Sets restrictions against all communication ports by blocking and unblocking them.
- Unique feature of White listing the authorized USB by using unique hardware ID of the device.
- Option of assigning USB Read only setting to white listed and non-white listed USB mass storage device.
- Prevent data theft as well as unauthorized access of critical data Locks USB, CD/DVD, IEEE, Network Adaptor, Printer, Infrared port and Bluetooth port.
- Options to open single or multiple ports with authorized password when it is Permanent locked/Idle locked/scheduled locked.
- Option of reporting system activities through e-mail or by FTP.
- Option of reporting system activities through mail as scheduled (i.e. Daily, Weekly, and Monthly etc.) by user.
- Option of sending Incremental Report or Complete Report as selected by user.
- Special feature of Print Screen Locking.
- Setting of report log size (Min 1 MB to Max 5 MB).
- File Transfer Log will show the reports of file transferred to and from a USB mass storage device & it will also show the detail reports of files added, removed and rename to and from a USB mass storage device.
- E-mail filtering log shows the complete log of the outgoing emails filtered and blocked on the client’s system. Detail includes date and time when the mail was blocked, receiver’s email address (To, Cc, Bcc), attachment name and size, subject of the email and content of body.
LAPTOP TRACKING & DATA ENCRYPTION
- Secure Webpage for every user to Keep (monitor) a close eye on movement of person with the designated laptop e.g. company employee.
- Remotely launch the data encryption module on predefined sensitive files and folders.
- Encrypts Data even if laptop is not connected to Internet for particular period.
- Reports on server contain information on date, time, Public IP. Location, country, state, city, ISP, Longitude & Latitude. No human intervention for reports.
- Informs about unauthorized use of laptop by clicking user photo and uploading to your report dashboard.
SYSBOOST
- Registry Clean Scans the registry and gives the accurate information of unwanted registries. It gives you the option to select and delete the unwanted registries, thereby making your system free from junk files.
- Registry Restore Helps to restore registry files which get deleted up when tuning up.
- Select and Wipe feature permanently erases files and their traces from your system.
- Select Extensions mentions the extensions of data which user want to delete permanently.
- Disk defragmenter is a tool that rearranges the data on your system’s drive so that it can run more efficiently.
- Internet Wipe Wipes away unwanted temporary internet files like cache memory, cookies, browsing history from your system permanently.
CRASH PROOF
- Deleted Data Recovery: Complete recovery of deleted/ lost Files & Folders
- Unformat formatted drives: Unformatting of the entire drive is possible with this solution
- Repair Damaged and Deleted Partitions: Repairing of inaccessible/ lost Partitions
Components
- Protegent Total Securtiy
- Port Locker
- Activity Reporter
- Laptop Tracking
- Crash Proof
- Sys Boost
Why Protegent 360 Complete Security?
- Protegent 360 Complete security solution for viruses, spywares, malwares, online threats, etc
- Provides 75% more features than any other security product
- Inbuilt proactive data recovery software
- Protect your confidential data from theft
- Monitor & reporting of computer internet and application activity
- Provides data encryption which protects your data in case of theft
- Enhances system performance
- Track your employee or laptop location