Well, look who has taken a leaf out of Webroot's book
They say that imitation is the siuncerest form of flattery...so take a look at Panda's latest offerings:
"The range includes four products. Antivirus Pro 2015($39.99) offers antivirus, antiphishing, a firewall and wifi protection; Internet Security 2015 ($49.99) adds Data Shield, parental controls and online backup;Global Protection 2015 ($69.99) includes protection for Mac, iPhone and Android devices, along with a password manager, file encryption and shredding tools, and a PC tuneup module; and the high-end Gold Protection ($89.99) offers a 20GB online storage and file sync service, and a “disinfection assurance” service where, if necessary, a Panda engineer remotely connects to your computer and removes any threats."
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.
Only if you pay $90...when you get superb, best in class support effectively for free whatever version of WSA you purchase...they really have not understood one of the things that makes WSA such a great product...doh!
"Tiny Local App
Jaroch explained that all the SecureAnywhere products are exactly the same file, with different features turned on based on which license key you use. Where most security suite installers weigh in anywhere from 60MB to well over 200MB, SecureAnywhere would fit on a floppy disk, so there's no reason to create separate versions.
Jaroch's team totally built the product from the ground up using raw C code. There are no embedded bitmaps, no visual tool libraries, no buttons. Every element of the user interface is rendered as needed.
"If you snap a screenshot of our product and save it as a bitmap, the screenshot will be bigger than the product itself," Jaroch said. Morris added that this minuscule local client leaves little "surface area" exposed to attack by malware."
"Immense Cloud Database
One reason the local application can be so tiny is that it doesn't include any malware signatures, Morris explained. The Prevx technology relies entirely on an immense database of applications and behaviors in my Cloud. This database collects and correlates an almost-unimaginable amount of information about every process ever run on any system with SecureAnywhere (or Prevx) installed. Along with the expected notes about process behavior it correlates things like the geographic location, browser version, and other elements of the sample's "habitat."
According to Morris, this database, code named ENZO, can include as many as two million database rows for a single process.
"Cybersecurity is all about information," said Morris. "We store and correlate allthe factors about the process's behavior in all the places it was seen. We aim to have more information than anyone, so we can offer better protection than anyone."
"A Researcher Inside Your PC
In most antivirus research labs, technicians dismantle malware samples, run them under controlled circumstances, and analyze what they do.
"Some threats may not do anything bad if they've been coded to lie low when running at, for example, a Symantec IP address," Morris said. He went on to explain, "I asked the researchers exactly what tools do you need, and what information do you expect to get? Then we put those tools into the product."
"Every user's PC becomes a malware researcher, Jaroch added. "We see the new behaviors immediately and get better information than if we ran the samples in our lab."