Viimeisin kampanjatiedotteemme on ilmestynyt 18.3.24, kts tarkemmat tiedot KAMPANJA-linkistä!

Softa SuperStore

19.03.2024 • • 10:10

Asiakaspalvelu
ark. 10.30 - 16
09 - 3424 370
 

          TUOTEHAKU

 TUOTERYHMÄT

 Muokkaa evästevalintoja
Näytä ostoskori
PÄÄVALIKKO
 
Luotettava Kumppani –yritys
 
Veloitukseton päivitysmuistutuspalvelu!
 
Softa SuperStore - yksi Suomen vahvimmista!

 

ZoneAlarm 2017 Extreme Security

ZoneAlarm®, a product line of Zone Labs, L.L.C. and Check Point Software Technologies, Inc., is one of the most secure brands in consumer Internet security. With over 90 million downloads, ZoneAlarm protects PCs from viruses, spyware, hackers and identity theft. The award-winning Internet security product line is installed in consumer PCs and small businesses, protecting them from Internet threats. The ZoneAlarm family of products is among the most popular and successful Internet security products available on the market. Check Point Software Technologies, Inc. is a wholly owned subsidiary of Check Point Software Technologies Ltd.

EXTREME SECURITY 2017
  • Protects you from WANNACRY and all other zero-day attacks
  • Prevents identity theft with advanced Anti-Phishing protection
  • Defends your entire family with best antivirus and Parental Controls
  • Find My Laptop, PC Tune-Up, Online Backup, Identity Protection and more are included.

https://sc1.checkpoint.com/sc1/za/images/icons/pc_win.png

ZONEALARM® EXTREME SECURITY 2017
ZERO-DAY PROTECTION
WITH THREAT EMULATION

Protects your Windows PC from unknown virus and firewall threats, including zero-day attacks, by analyzing suspicious files in the cloud before they can harm your computer. It’s the ultimate solution for internet security, firewall protection and an advanced antivirus filtering.

Virtual Sandbox

Easily send email attachments and documents to a secure, cloud-based environment before opening them.

Behavior Emulation

The files are then opened in a virtual sandbox and their behavior is analyzed for abnormalities.

Infection Prevention

Files identified as malicious by our antivirus technology are marked so you can delete them and prevent infection.

Antivirus & Firewall

Antivirus & Anti-Spyware Engine

Detects and removes viruses, spyware, Trojan horses, worms, bots and more. Independently tested to provide superior protection.

  • Kernel-Level Virus Prevention protects the operating system.
  • Scan Modes let you customize your protection.
  • Fastest-Updating Signature List detects and stops the most recent viruses that others miss.
Advanced Real-Time Antivirus

Provides access to the up-to-date database of Antivirus signatures to protect against newly emerging threats. Real-Time Cloud Database contains up-to-date reputation of files, web resources and software enhancing traditional Antivirus + Firewall protection.

  • Checks files against Real-time Cloud database to ensure that even the latest threats are not missed.
  • Contains the latest Antivirus signatures, web resources and software to ensure up-to-date protection.
Two-way Firewall

Stops Internet attacks at the front door and even catches thieves on their way out. Our two-way firewall proactively protects against inbound and outbound attacks while making you invisible to hackers.

  • Threat Traffic is monitored and blocked – inbound and outbound.
  • Full Stealth Mode makes you invisible to hackers.
  • Kill Controls instantly disable malicious programs.
Advanced Firewall

No product is 100% effective against viruses or spyware. ZoneAlarm’s advanced firewall monitors behaviors within your computer to spot and stop even the most sophisticated new attacks that bypass traditional antivirus and security suites.

  • OSFirewall™ Monitors programs for suspicious behavior – spotting and stopping new attacks that bypass traditional anti-virus protection.
  • Advanced-access Protection targets and defeats new, advanced attacks that other firewalls miss, such as raw data access, timing, and SCM and COM attacks.
  • Zero-hour Protection prevents silent outbreaks from gaining system access – before other security programs can even detect the threat.
  • Application Control uniquely shields your operating system during start-up, before most security products have even loaded.
  • Early Boot Protection uniquely shields your operating system during start-up, before most security products have even loaded.
Threat Emulation

For any file you select, Threat Emulation protects against undiscovered threats by examining suspicious files in the cloud using four steps:

  • Inspect – Email attachments and web downloads in MS Office, Adobe PDF and Zip formats are analyzed to see if they are safe or malicious based on known threats.
  • Emulate – Suspicious files are uploaded to the cloud and opened in a virtual sandbox to check for abnormal behavior typical of malware.
  • Prevent – If a file is determined to be malicious, you are alerted to delete it before it can infect your PC.
  • Share – The Threat Emulation cloud database is updated with the new signatures preventing others from being infected.
PC Tune-Up

Keeps your PC running smoothly – automatically cleaning, organizing and streamlining your computer so it runs faster.

  • Registry Repair and Defragmentation optimizes your registry by removing unused and redundant entries that make your computer operate more slowly.
  • Disc Defragmentation optimizes the time it takes to retrieve and create files – making everyday computer operation faster, and in some cases freeing disk space.
  • Temporary File Cleaner cleans out temporary and redundant files on your computer to free up disk space and reduce clutter.
  • Low Resource Use is a system-maintenance program that is so light on resources, you’ll hardly know it’s running.
Additional Layers

Multiple layers of advanced protection provide unsurpassed security.

  • Anti-Spam filters out annoying and potentially dangerous emails.
  • Wireless PC Protection shields you from hackers, identity thieves and other online threats when you connect to an unsecured network.
  • Automatic Wireless Network Security detects wireless networks and automatically applies the most secure firewall protection setting.
  • DefenseNet™ provides real-time security updates, responds quickly to breaking threats and leverages threat data from millions of users – protecting your PC from the latest attacks.

Web Security

Browser Protection

Enhanced Browser Protection scans websites for dangerous scripts, files, archives and packed executables before they are downloaded onto the end-users’ computer, preventing scripts/files from ever saving to disk or executing if they are found to be dangerous.

Anti-Spam

Filters out annoying and potentially dangerous emails.

Anti-Keylogger

Prevents identity thieves from seeing your passwords and other keystrokes.

Parental Controls

Protect your children on the Web with powerful filters and controls. Your children can still do the things they need to do, but now they won’t see things they don’t need to see.

  • Block dangerous content and programs: Stop pornography, profanity, hate sites, questionable chat rooms and online gambling. Create your own custom “block” list and more.
  • Control Net usage: Limit the hours and define the time periods when your kids can use the Web.
  • Protect your kids beyond the Web: Block PC games that are rated too mature or too violent. Get protection for instant messages (IMs), chat rooms, email, FTP, forums and more.

Online Privacy

Private Browsing

Erases your cache and all, cookies, history and passwords – letting you browse the Web in complete privacy.

Mobility & Data

Find My Laptop

Locates your lost or stolen laptop using Wi-Fi enabled location tracking which uses Google Maps and ZoneAlarm technology.

  • Laptop Locate – Finds and displays the location of your missing laptop on a worldwide map including the address.
  • Remote Lock – Remotely locks your laptop to prevent intruders from accessing your data.
  • Message to Finder – Sends a custom message to the finder for a quick return of your missing laptop.
  • File Recovery – Remotely retrieves and backsup important files from your missing laptop. Deletes sensitive information remotely.
  • Webcam Snapshot – Takes a snap picture of any person using your laptop.
Identity Protection Services

Identity theft can happen to anyone, anywhere. ZoneAlarm delivers superior PC-based protection and exclusive data encryption, and also offers offline identity-protection services.

  • Daily Credit Monitoring and Fraud Alerts include daily credit reports with email alerts. You’ll be notified of any changes in your credit reports – which are often an indication of identity theft (US only).
  • Victim Recovery Service provides free telephone counseling to guide identity-theft victims through resolution and recovery (US only).
Online Backup

Your tax returns, your music and your photos are valuable. Protect your files in the event of loss, theft, accidental deletion or disk failure.

  • Automated Backups schedule the backup of data at your convenience. Includes optional automatic shutdown of your computer when backup is complete.
  • Efficient Backups effectively utilize your Internet bandwidth as the data files are compressed during transmission. Furthermore, only the modified portions of your files are backed up – speeding up the process.
  • User-defined Encryption Keys secure your files as they are uploaded and downloaded. All stored data is encrypted with a secure key and a password known only to you – protecting your data from hackers.

Support

  • Free upgrades for 12 months. You’ll be notified automatically when a free new version is available.
  • Free customer support includes in-depth information, forums and online LiveChat 24/7.
  • 30-day guarantee: Satisfaction guaranteed or you’ll get your money back.

Software Features

  • Anti-Phishing
    Protects you against Phishing attacks.
  • Antivirus/Anti-Spyware Engine
    Detects and remove viruses, spyware, Trojan horses, worms, bots and rootkits.
  • Advanced Real-Time Antivirus
    Enhances protection by checking against an always up-to-date cloud database of antivirus signatures.
  • Advanced Firewall
    Monitors programs for suspicious behavior spotting and stopping new attacks that bypass traditional anti-virus protection.
  • Two-way Firewall
    Makes your PC invisible to hackers and stops spyware from sending your data out to the Internet.
  • Anti-Spam
    Filters out annoying and potentially dangerous emails.
  • PC Tune-up
    Cleans, organizes and streamlines your computer – improving its performance.
  • Online Backup
    Backs up files and restores your data in the event of hardware malfunction.
  • Identity Protection
    Helps to prevent identity theft by guarding your personal data.
  • Parental Controls
    Filters and blocks inappropriate websites and chat rooms and limits time spent online.
  • Threat Emulation
    Opens email attachments and web downloads in a virtual cloud environment to see if they are safe.
  • Browser Protection
    Protects your computer from web threats before they reach your browser.
  • Find My Laptop
    Locates your lost or stolen laptop on a map, locks it down and allows remote recovery of important files.
  • Anti-Keylogger
    Prevents identity thieves from stealing your passwords and keystrokes.

System Requirements

Anti-Phishing Add-on
  • Google® Chrome all versions
Microsoft® Windows® 8, 8.1, 10 All versions
  • 32-bit / 64-bit, 2 GB RAM
  • 2 GHz or faster processor
  • 1.5GB of available hard-disk space
Microsoft® Windows 7 SP1 All versions
  • 32-bit / 64-bit, 2 GB RAM
  • 2 GHz or faster processor
  • 1.5GB of available hard-disk space
Microsoft® Windows Vista SP2 All versions
  • 32-bit / 64-bit, 2 GB RAM
  • 2 GHz or faster processor
  • 1.5GB of available hard-disk space
Microsoft® Windows XP SP3 Home / Professional
  • 32-bit, 1GB RAM
  • 1 GHz or faster processor
  • 1.5B of available hard-disk space
Microsoft .NET framework
  • Version 3.5 or later
  • Note: If a supported Microsoft .NET Framework is not installed, it will be installed with ZoneAlarm 2017

Softa SuperStore
Softa SuperStore
Softa SuperStore