plus 0% sales tax/VAT to USD 40.00: USD 0.00
||Download, License key
||Full version: 181.9 MB
- 56k: ~424 min.
- DSL/Cable (1/8/16Mbit): ~25 / ~3 / ~2 min.
Protegent 360 is a complete package designed to provide the complete security to your laptop. In today’s world every person is using laptop and as the usages of laptop increased the theft cases also increased, it is not just the case of laptop it’s about the important and private data theft, users seriously need to protect his/her laptop and important data saved into it. Laptops are mobile devices and very much vulnerable to theft. In most of the cases the purpose of stealing the laptop is to get that confidential data. So to protect your laptop and data you need to use any software and Protegent 36o provides you the complete security.
Protegent 360 provides you a 4-tier protection for your laptop.
- Protegent Total Security
- Port Locker & Data Leakage Prevention
- Activity Monitoring & Reporting
- Laptop Tracking with Data Encryption
- Protegent protects your computer from all kind of viruses, Trojans, Spywares, Rootkits, and Malwares. It helps you to keep your system clean and healthy.
- Anti-spam feature block unwanted mails to come to your mail client Inbox on your system.
- Removes unnecessary files and registry entries, for optimized performance
- Provide hassle free working by making optimal security decisions without your interruption.
- Minimize power consumption while your laptops are running on battery by disabling auto scan and auto updates.
- Game Mode temporarily modifies protection settings to minimize their impact on system performance
- Protegent total security software takes updates every hour. It takes updates so that this software can protect our system with new virus.
- Anti-phishing feature blocks all the Webpages which are supporting viruses scams and personal data phishing attempts.
- Triggers system scans when resources usage falls below a certain threshold to avoid any impact on your system’s performance
- Captures all Internet activity with features of Blacklist and White list
- Capture the Screen shot within a specified time Interval or on every mouse click.
- Captures all key strokes. Intercept DOS-box and Java –chat Keystrokes.
- Captures all system application activity with features of Blacklist and White list
- Captures ICQ, Miranda, Skype, Google Talk , MSN, AIM, AOL, Yahoo, QIP Chats
- Captures Clipboard content
- Provides the details of the each user login and log out time
- Complete activity report w.r.t. user login if multiple users are working on same machine
- Complete Activity Report with respect to user login if multiple users are working on the same system (machine)
- You can get the login and logout details of each and every user.
- You can block all the ports with the help of Port Locker software to prevent your system from unauthorized access. You can block USB port, Bluetooth port, Infrared port, IEEE 1394 port, Network Adaptors port.
- Unique feature of White listing the authorized USB by using unique hardware ID of the device
- Option of assigning USB read only setting to white listed and non-white listed USB mass storage device.
- File transfer logs will show the reports of file transferred to and from USB device and also show the reports of file added, removed, renamed & modified.
- Multiple or Single ports can be blocked automatically according to the set schedule and you can block the port even if you leave your system idle. Only authorized user can unblock the Port by using the password.
- Removable or Inbuilt CD/DVD ROM can be blocked by blocking CD/DVD ROM port, no one will be able to read or write the CD/DVD from the system.
- No Print command will work when Printer port is blocked
- You can block and unblock Multiple or single port in one shot.
- Email filtering logs shows the log of outgoing email filtered and blocked on the user machine. Details include data & time when the mail was blocked, receiver's email address (To, cc, Bcc), attachment name, attachment size, subject and content of body.
- Secure Webpage for every user to Keep (monitor) a close eye on movement of person with the designated laptop e.g. company employee.
- Remotely launch the data encryption module on predefined sensitive files and folders.
- Encrypts Data even if laptop is not connected to Internet for particular period.
- Reports on server contain information on date, time, Public IP. Location, country, state, city, ISP, Longitude & Latitude. No human intervention for reports