| Finding and removing malware |
| Dual-engine virus and malware detection |
|
|
|
| Super fast system scans (1-2 min) |
|
|
|
| PUP/unwanted programs detection |
|
|
|
| Advanced infection cleaning |
|
|
|
| Safe quarantine of suspicious files |
|
|
|
| Scan exclusions/allow list |
|
|
|
| Scheduled scans |
|
|
|
| Windows Explorer integration |
|
|
|
| Command line interface included |
|
|
|
| Emergency Kit maker included |
|
|
|
| Preventing new infections |
| Multi-layered real-time protection |
|
|
|
| Web Protection |
|
|
|
| Anti-phishing |
|
|
|
| Browser security |
|
|
|
| File Guard |
|
|
|
| Behavior Blocker |
|
|
|
| Anti-Ransomware |
|
|
|
| Exploit prevention |
|
|
|
| System manipulation prevention |
|
|
|
| Application hardening |
|
|
|
| Advanced Persistent Threat (APT) protection |
|
|
|
| Fileless malware protection |
|
|
|
| Targeted attack prevention |
|
|
|
| Botnet protection |
|
|
|
| False positives verification |
|
|
|
| Protection exclusions/allow list |
|
|
|
| Hourly automatic updates |
|
|
|
| Emergency network lockdown mode |
|
|
|
| Shutdown & uninstall prevention via password |
|
|
|
| Windows Firewall monitoring and hardening |
|
|
|
| Windows RDP attack detection |
|
|
|
| Endpoint detection and response (EDR) |
| Suspicious behavior monitoring |
On endpoint only |
On endpoint and in cloud. High-confidence events only |
On endpoint and in cloud. All confidence levels events |
| Incidents retention time |
|
365 days |
365 days |
| Raw log data retention time |
|
0 days |
30 days |
| Local detections on devices |
|
|
|
| Quick allow/quarantine/block everywhere |
|
|
|
| Device isolation |
|
|
|
| Execution tree & timeline |
|
|
|
| MITRE ATT&CK tactics & techniques |
|
|
|
| Deep threat insights |
|
|
|
| Workspace-wide threat hunting |
|
|
|
| Endpoint visibility with OSQuery |
|
|
|
| SOC/SIEM integration via Syslog |
|
|
|
| Centralized management |
| Management Console included |
Simplified |
Fully featured |
Fully featured |
| Industry leading mirror view |
|
|
|
| Web access & mobile app |
|
|
|
| “Local only” management mode |
|
|
|
| “Local & remote” management mode |
|
|
|
| “Remote only” management mode |
|
|
|
| Traffic caching relay devices (multiple) |
|
|
|
| Incident investigation tools |
|
|
|
| Forensics & audit logs |
|
|
|
| Remote scans & quarantine |
|
|
|
| Device isolation |
|
|
|
| Device health & system overview |
|
|
|
| Email, webhook & push notifications |
|
|
|
| Advanced reporting |
|
|
|
| Logs and reports retention time |
30 days |
180 days |
365 days |
| Protection policies for device groups |
|
|
|
| Permission policies for user groups |
|
|
|
| Granular permissions for inpidual users |
|
|
|
| Maximum protection policies |
10 |
10 |
Unlimited |
| Maximum permission policies |
10 |
10 |
Unlimited |
| Maximum workspace managers |
2 |
2 |
Unlimited |
| Invite Emsisoft partners (MSPs) to manage workspace |
|
|
|
| REST Web API for all features |
|
|
|
| Task automation & Windows Server features |
| Scheduled scans |
|
|
|
| Command line interface included |
|
|
|
| Email notifications for relevant events |
|
|
|
| Monitoring of file shares and connected storage |
|
|
|
| Protection without logged in users |
|
|
|
| Silent mode/gaming mode |
|
|
|
| Windows Server OS supported |
|
|
|
| Active Directory integration |
|
|
|
| Automatic detection of new devices |
|
|
|
| Remote deployment through relay devices |
|
|
|
| Dedicated Emsisoft benefits |
| Money back guarantee |
|
|
|
| Malware removal assistance |
|
|
|
| Always get the latest version |
|
|
|
| Certified protection |
|
|
|
| Privacy conscious design |
|
|
|
| Email & live chat support |
|
|
|
| Skip-the-line priority support |
|
|
|
| Call-back service (8am-9pm ET) |
|
|
|
| Dedicated customer support manager |
|
|
|
| |
See details |
See details |
See details |