Categories
Security

Dynamic Security Agent Security Related Security for Windows

The proactive, multi-layered defense solution for Windows desktops and servers
Dynamic Security Agent is a defense application comprised of several distinct technology layers designed to block or mitigate the damage caused by intrusion, virus and other malware attacks

DSA’s layered approach to PC and enterprise endpoint defense addresses the Windows vulnerabilities and progressive techniques that hackers exploit to gain unauthorized system access and deliver malicious payloads. DSA provides Application Security by providing detailed alerts for incoming and outgoing application-specific Internet traffic.

DSA also models and monitors system behavior to identify and block activity characteristic of known malware, hacking, phishing and other threat types so that personal computer users and IT managers within small, medium or large organizations can more effectively and proactively protect the environments and private data for which they are responsible.

Although DSA will detect, block and quarantine known and new forms of malicious software and other threats, it does not remove the malware. DSA is therefore an ideal complement to conventional virus and spyware scanning software as well as personal and server firewall applications.

Neither DSA nor any other single layer of protection should be solely relied on to protect your system. DSA enables you to be aware of the activity on your computer and detects, blocks and alerts you to suspicious activity. These days, what seems normal online (a greeting card, banking site, attachment, etc.) may not be. DSA enables you to be aware, cautious and better protected.

Here are some key features of “Dynamic Security Agent”:

DSA features the following layers of defense technology:
· Application Monitor/Manager
· Registry Monitor
· Process Monitor/Manager
· Email Anomaly Analyzer/Manager
· System Anomaly Analyzer
DSA also detects malware and intrusions based on behaviors characteristic of unauthorized system use. Some of these include:
· Attempts to access a protected registry area
· Attempts to access a protected object
· Attempts to Initiate a foreign process
· Attempts to control Windows service
· Attempts to create a DNS request
· Attempts to initiate outgoing TCP traffic

What’s New in This Release: [ read full changelog ]

· Added Vista (32-bit) support

See Demo – Download – Visit Author Site

Please comments and give ratings. You may also report of broken or incorrect link using comments box below. Thanks!