Distribution
 
 
RISING Anti-Virus
Active Defense Technology
Functional Optimization
New Firewall Functions
Summary
 
 
 
Active Defense Technology
 
Rising’s Active Defense Technology is designed to prevent the execution of malicious programs. It provides more open rules for advanced user customization, which enables the user to define unique defense rules depending upon the special circumstances of his/her own system, thus maximizing the system’s protection.
 
System Reinforcement

System Reinforcement aims to monitor and reinforce OS vulnerabilities that are easily utilized by malicious programs so as to defend from intrusions by malicious programs. Its functions mainly cover the following:

  • Monitor system behaviors as well as the use of SetHook and LoadDriver by all programs;
  • Monitor the registry to prevent any unauthorized changes by unknown programs;
  • Monitor and protect key processes of the system;
  • Protect system files and prevent them from damage by unknown programs.
 
Application Protection

Application Protection can protect specified applications from attack by malicious programs. A user can apply rules to game software, instant messenger, etc. to customize protection.

Rising Anti-Virus 2008 provides users with eight rules: Anti-DLL Injection, Anti-CodeInjection, Anti-Memory Modification, Anti-Memory Read, Prevent Suspension, Prevent Termination, Anti-Simulated Sending, and Anti-Simulated Key.

 
Self-Protection

Previous versions have not offered complete protection to Rising products themselves, resulting in damage to Rising products by specific viruses such as Orange August. The spread of such viruses has prevented users from running Rising products or to browse the Rising website.We now employ Active Defense Technology to address this omission.

 
Application Access Control

Application Access Control monitors suspicious programs to limit their access to computer resources.

 
Program Startup Control

Program Startup Control allows users to monitor the startup process of programs, thus being able to intercept and prevent the execution of unknown malicious programs as well as detecting any modification of applications.

 
Malicious Behavior Detection

Malicious Behavior Detection monitors programs running in the system to detect and report the behavior patterns of malicious code, optionally allowing the user to authorize or reject suspicious activity.

  
Hidden Process Detection

Hidden Process Detection can detect processes that cannot be seen in the Windows Task Manager that may contain malicious code, including rootkits.

 
Computer Security Check

The Computer Security Check function informs the user of the current security level and guides him/her in strengthening it to prevent intrusions.

 
Security Tool Integration Platform

The Security Tool Integration platform provides the following tools: Other Embedded Scan, Registration Wizard, Hard Disk Essential Data Backup, Latest Installation Creation Tool, Application Protection Wizard, Vulnerability Check, and View Quarantine.

  
Microsoft IE/Office/Outlook Embedded Scan
A virus scan will start automatically when:
  • Opening a Microsoft Office document.
  • Downloading ActiveX code in Internet Explorer.
  • Sending and receiving email in Microsoft Outlook.
Top   
 
Please contact 017-3630187 or fax to 03-7876 4333 to get ultimate IT support. Email: securisys@gmail.com / info@securisys.com.my for quotations .
 
All Right Reserved.
www.Securisys.com.my