 |
ZoneAlarm®, a product line of Zone Labs, L.L.C. and Check Point Software Technologies, Inc., is one of the most secure brands in consumer Internet security. With over 90 million downloads, ZoneAlarm protects PCs from viruses, spyware, hackers and identity theft. The award-winning Internet security product line is installed in consumer PCs and small businesses, protecting them from Internet threats. The ZoneAlarm family of products is among the most popular and successful Internet security products available on the market. Check Point Software Technologies, Inc. is a wholly owned subsidiary of Check Point Software Technologies Ltd.
|
 |
EXTREME SECURITY 2017
- Protects you from WANNACRY and all other
zero-day attacks
- Prevents identity theft with advanced Anti-Phishing protection
- Defends your entire family with best antivirus and Parental Controls
- Find My Laptop, PC Tune-Up, Online Backup, Identity Protection and more are included.

|
ZONEALARM®
EXTREME SECURITY 2017
ZERO-DAY PROTECTION
WITH THREAT EMULATION
Protects your Windows PC
from unknown virus and firewall threats, including
zero-day attacks, by analyzing suspicious files in
the cloud before they can harm your computer. It’s
the ultimate solution for internet security,
firewall protection and an advanced antivirus
filtering.
Virtual Sandbox
Easily send email
attachments and documents to a secure,
cloud-based environment before opening them.
Behavior Emulation
The files are then
opened in a virtual sandbox and their behavior
is analyzed for abnormalities.
Infection Prevention
Files identified as
malicious by our antivirus technology are marked
so you can delete them and prevent infection.
|
 |
Antivirus & Firewall
Antivirus & Anti-Spyware Engine
Detects and removes viruses, spyware, Trojan horses, worms,
bots and more. Independently tested to provide superior
protection.
- Kernel-Level Virus Prevention protects the operating
system.
- Scan Modes let you customize your protection.
- Fastest-Updating Signature List detects and stops the
most recent viruses that others miss.
Advanced Real-Time Antivirus
Provides access to the up-to-date database of Antivirus
signatures to protect against newly emerging threats. Real-Time
Cloud Database contains up-to-date reputation of files, web
resources and software enhancing traditional Antivirus +
Firewall protection.
- Checks files against Real-time Cloud database to ensure
that even the latest threats are not missed.
- Contains the latest Antivirus signatures, web resources
and software to ensure up-to-date protection.
Two-way Firewall
Stops Internet attacks at the front door and even catches
thieves on their way out. Our two-way firewall proactively
protects against inbound and outbound attacks while making you
invisible to hackers.
- Threat Traffic is monitored and blocked – inbound and
outbound.
- Full Stealth Mode makes you invisible to hackers.
- Kill Controls instantly disable malicious programs.
Advanced Firewall
No product is 100% effective against viruses or spyware.
ZoneAlarm’s advanced firewall monitors behaviors within your
computer to spot and stop even the most sophisticated new
attacks that bypass traditional antivirus and security suites.
- OSFirewall™ Monitors programs for suspicious behavior –
spotting and stopping new attacks that bypass traditional
anti-virus protection.
- Advanced-access Protection targets and defeats new,
advanced attacks that other firewalls miss, such as raw data
access, timing, and SCM and COM attacks.
- Zero-hour Protection prevents silent outbreaks from
gaining system access – before other security programs can
even detect the threat.
- Application Control uniquely shields your operating
system during start-up, before most security products have
even loaded.
- Early Boot Protection uniquely shields your operating
system during start-up, before most security products have
even loaded.
Threat Emulation
For any file you select, Threat Emulation protects against
undiscovered threats by examining suspicious files in the cloud
using four steps:
- Inspect – Email attachments and web downloads in MS
Office, Adobe PDF and Zip formats are analyzed to see if
they are safe or malicious based on known threats.
- Emulate – Suspicious files are uploaded to the cloud and
opened in a virtual sandbox to check for abnormal behavior
typical of malware.
- Prevent – If a file is determined to be malicious, you
are alerted to delete it before it can infect your PC.
- Share – The Threat Emulation cloud database is updated
with the new signatures preventing others from being
infected.
PC Tune-Up
Keeps your PC running smoothly – automatically cleaning,
organizing and streamlining your computer so it runs faster.
- Registry Repair and Defragmentation optimizes your
registry by removing unused and redundant entries that make
your computer operate more slowly.
- Disc Defragmentation optimizes the time it takes to
retrieve and create files – making everyday computer
operation faster, and in some cases freeing disk space.
- Temporary File Cleaner cleans out temporary and
redundant files on your computer to free up disk space and
reduce clutter.
- Low Resource Use is a system-maintenance program that is
so light on resources, you’ll hardly know it’s running.
Additional Layers
Multiple layers of advanced protection provide unsurpassed
security.
- Anti-Spam filters out annoying and potentially dangerous
emails.
- Wireless PC Protection shields you from hackers,
identity thieves and other online threats when you connect
to an unsecured network.
- Automatic Wireless Network Security detects wireless
networks and automatically applies the most secure firewall
protection setting.
- DefenseNet™ provides real-time security updates,
responds quickly to breaking threats and leverages threat
data from millions of users – protecting your PC from the
latest attacks.
|
 |
Web Security
Browser Protection
Enhanced Browser Protection scans websites for dangerous
scripts, files, archives and packed executables before they are
downloaded onto the end-users’ computer, preventing
scripts/files from ever saving to disk or executing if they are
found to be dangerous.
Anti-Spam
Filters out annoying and potentially dangerous emails.
Anti-Keylogger
Prevents identity thieves from seeing your passwords and
other keystrokes.
Parental Controls
Protect your children on the Web with powerful filters and
controls. Your children can still do the things they need to do,
but now they won’t see things they don’t need to see.
- Block dangerous content and programs: Stop pornography,
profanity, hate sites, questionable chat rooms and online
gambling. Create your own custom “block” list and more.
- Control Net usage: Limit the hours and define the time
periods when your kids can use the Web.
- Protect your kids beyond the Web: Block PC games that
are rated too mature or too violent. Get protection for
instant messages (IMs), chat rooms, email, FTP, forums and
more.
|
 |
Online Privacy
Private Browsing
Erases your cache and all, cookies, history and passwords –
letting you browse the Web in complete privacy.
|
Mobility & Data
Find My Laptop
Locates your lost or stolen laptop using Wi-Fi enabled
location tracking which uses Google Maps and ZoneAlarm
technology.
- Laptop Locate – Finds and displays the location of your
missing laptop on a worldwide map including the address.
- Remote Lock – Remotely locks your laptop to prevent
intruders from accessing your data.
- Message to Finder – Sends a custom message to the finder
for a quick return of your missing laptop.
- File Recovery – Remotely retrieves and backsup important
files from your missing laptop. Deletes sensitive
information remotely.
- Webcam Snapshot – Takes a snap picture of any person
using your laptop.
Identity Protection Services
Identity theft can happen to anyone, anywhere. ZoneAlarm
delivers superior PC-based protection and exclusive data
encryption, and also offers offline identity-protection
services.
- Daily Credit Monitoring and Fraud Alerts include daily
credit reports with email alerts. You’ll be notified of any
changes in your credit reports – which are often an
indication of identity theft (US only).
- Victim Recovery Service provides free telephone
counseling to guide identity-theft victims through
resolution and recovery (US only).
Online Backup
Your tax returns, your music and your photos are valuable.
Protect your files in the event of loss, theft, accidental
deletion or disk failure.
- Automated Backups schedule the backup of data at your
convenience. Includes optional automatic shutdown of your
computer when backup is complete.
- Efficient Backups effectively utilize your Internet
bandwidth as the data files are compressed during
transmission. Furthermore, only the modified portions of
your files are backed up – speeding up the process.
- User-defined Encryption Keys secure your files as they
are uploaded and downloaded. All stored data is encrypted
with a secure key and a password known only to you –
protecting your data from hackers.
|
 |
Support
- Free upgrades for 12 months. You’ll be notified
automatically when a free new version is available.
- Free customer support includes in-depth information,
forums and online LiveChat 24/7.
- 30-day guarantee: Satisfaction guaranteed or you’ll get
your money back.
|
Software Features
-
Anti-Phishing
Protects you
against Phishing attacks.
-
Antivirus/Anti-Spyware Engine
Detects and
remove viruses, spyware, Trojan horses, worms, bots
and rootkits.
-
Advanced Real-Time Antivirus
Enhances
protection by checking against an always up-to-date
cloud database of antivirus signatures.
-
Advanced Firewall
Monitors programs
for suspicious behavior spotting and stopping new
attacks that bypass traditional anti-virus
protection.
-
Two-way Firewall
Makes your PC
invisible to hackers and stops spyware from sending
your data out to the Internet.
-
Anti-Spam
Filters out
annoying and potentially dangerous emails.
-
PC Tune-up
Cleans, organizes
and streamlines your computer – improving its
performance.
-
Online Backup
Backs up files
and restores your data in the event of hardware
malfunction.
-
Identity Protection
Helps to prevent
identity theft by guarding your personal data.
-
Parental Controls
Filters and
blocks inappropriate websites and chat rooms and
limits time spent online.
-
Threat Emulation
Opens email
attachments and web downloads in a virtual cloud
environment to see if they are safe.
-
Browser Protection
Protects your
computer from web threats before they reach your
browser.
-
Find My Laptop
Locates your lost
or stolen laptop on a map, locks it down and allows
remote recovery of important files.
-
Anti-Keylogger
Prevents identity
thieves from stealing your passwords and keystrokes.
|
 |
System Requirements
Anti-Phishing Add-on
- Google® Chrome all versions
Microsoft® Windows® 8, 8.1, 10 All
versions
- 32-bit / 64-bit, 2 GB RAM
- 2 GHz or faster processor
- 1.5GB of available hard-disk
space
Microsoft® Windows 7 SP1 All versions
- 32-bit / 64-bit, 2 GB RAM
- 2 GHz or faster processor
- 1.5GB of available hard-disk
space
Microsoft® Windows Vista SP2 All versions
- 32-bit / 64-bit, 2 GB RAM
- 2 GHz or faster processor
- 1.5GB of available hard-disk
space
Microsoft® Windows XP SP3 Home /
Professional
- 32-bit, 1GB RAM
- 1 GHz or faster processor
- 1.5B of available hard-disk
space
Microsoft .NET framework
- Version 3.5 or later
- Note: If a supported
Microsoft .NET Framework is not installed, it will be
installed with ZoneAlarm 2017
|
 |
|
|