![]() Monitors process behaviors and looks for suspicious activities typical of exploits. Exploit Blocker - Fighting Targeted Attacks: Strengthens security of applications such as web browsers, PDF readers, email clients or MS office components, which are commonly exploited.Only information about executable and archive files is sent to the cloud – such data are not personally attributable. ![]() Optional cloud-powered scanning: Whitelisting of safe files based on file reputation database in the cloud for better detection and faster scanning. ![]()
0 Comments
Leave a Reply. |