Finding and removing malware |
Dual-engine virus and malware detection |
|
|
|
Super fast system scans (1-2 min) |
|
|
|
PUP/unwanted programs detection |
|
|
|
Advanced infection cleaning |
|
|
|
Safe quarantine of suspicious files |
|
|
|
Scan exclusions/allow list |
|
|
|
Scheduled scans |
|
|
|
Windows Explorer integration |
|
|
|
Command line interface included |
|
|
|
Emergency Kit maker included |
|
|
|
Preventing new infections |
Multi-layered real-time protection |
|
|
|
Web Protection |
|
|
|
Anti-phishing |
|
|
|
Browser security |
|
|
|
File Guard |
|
|
|
Behavior Blocker |
|
|
|
Anti-Ransomware |
|
|
|
Exploit prevention |
|
|
|
System manipulation prevention |
|
|
|
Application hardening |
|
|
|
Advanced Persistent Threat (APT) protection |
|
|
|
Fileless malware protection |
|
|
|
Targeted attack prevention |
|
|
|
Botnet protection |
|
|
|
False positives verification |
|
|
|
Protection exclusions/allow list |
|
|
|
Hourly automatic updates |
|
|
|
Emergency network lockdown mode |
|
|
|
Shutdown & uninstall prevention via password |
|
|
|
Windows Firewall monitoring and hardening |
|
|
|
Windows RDP attack detection |
|
|
|
Endpoint detection and response (EDR) |
Suspicious behavior monitoring |
On endpoint only |
On endpoint and in cloud. High-confidence events only |
On endpoint and in cloud. All confidence levels events |
Incidents retention time |
|
365 days |
365 days |
Raw log data retention time |
|
0 days |
30 days |
Local detections on devices |
|
|
|
Quick allow/quarantine/block everywhere |
|
|
|
Device isolation |
|
|
|
Execution tree & timeline |
|
|
|
MITRE ATT&CK tactics & techniques |
|
|
|
Deep threat insights |
|
|
|
Workspace-wide threat hunting |
|
|
|
Endpoint visibility with OSQuery |
|
|
|
SOC/SIEM integration via Syslog |
|
|
|
Centralized management |
Management Console included |
Simplified |
Fully featured |
Fully featured |
Industry leading mirror view |
|
|
|
Web access & mobile app |
|
|
|
“Local only” management mode |
|
|
|
“Local & remote” management mode |
|
|
|
“Remote only” management mode |
|
|
|
Traffic caching relay devices (multiple) |
|
|
|
Incident investigation tools |
|
|
|
Forensics & audit logs |
|
|
|
Remote scans & quarantine |
|
|
|
Device isolation |
|
|
|
Device health & system overview |
|
|
|
Email, webhook & push notifications |
|
|
|
Advanced reporting |
|
|
|
Logs and reports retention time |
30 days |
180 days |
365 days |
Protection policies for device groups |
|
|
|
Permission policies for user groups |
|
|
|
Granular permissions for inpidual users |
|
|
|
Maximum protection policies |
10 |
10 |
Unlimited |
Maximum permission policies |
10 |
10 |
Unlimited |
Maximum workspace managers |
2 |
2 |
Unlimited |
Invite Emsisoft partners (MSPs) to manage workspace |
|
|
|
REST Web API for all features |
|
|
|
Task automation & Windows Server features |
Scheduled scans |
|
|
|
Command line interface included |
|
|
|
Email notifications for relevant events |
|
|
|
Monitoring of file shares and connected storage |
|
|
|
Protection without logged in users |
|
|
|
Silent mode/gaming mode |
|
|
|
Windows Server OS supported |
|
|
|
Active Directory integration |
|
|
|
Automatic detection of new devices |
|
|
|
Remote deployment through relay devices |
|
|
|
Dedicated Emsisoft benefits |
Money back guarantee |
|
|
|
Malware removal assistance |
|
|
|
Always get the latest version |
|
|
|
Certified protection |
|
|
|
Privacy conscious design |
|
|
|
Email & live chat support |
|
|
|
Skip-the-line priority support |
|
|
|
Call-back service (8am-9pm ET) |
|
|
|
Dedicated customer support manager |
|
|
|
|
See details |
See details |
See details |