Faronics Anti-Virus

張貼者:2010年7月16日 上午2:22未知的使用者   [ eddie liu 已於 2012年8月9日 上午1:53 更新 ]

Faronics Anti-Executable


Faronics Anti-Virus combines anti-virus, anti-spyware, and anti-rootkit technologies into a comprehensive solution that integrates seamlessly with Deep Freeze.

開發商: Faronics Corporation
原廠網址: http://www.faronics.com/en/Anti-Virus.aspx
採購正式版、大量授權報價、技術支援、軟體諮詢、委託採購、詢問報價請來電 02-29299388 分機16 , 



迎接新成員的Faronics產品系列 - Faronics Anti-Virus Enterprise

不同於傳統的防毒解決方案不順暢,資源密集,Faronics Anti-Virus 提供高性能的,主動的端點的惡意軟體保護。 最重要的是,它無縫集成Faronics深凍結 ,因此您可以更新您的定義,甚至在你的工作站保護處於凍結狀態!

傳統的安全套件通常技術已經收購了時間和拼湊起來的,以補充視聽。Faronics防病毒已經從地面發展起來,並結合反病毒,反間諜,反rootkit的技術集成到一個緊密整合的解決方案。 Faronics反病毒還提供了先進的電子郵件防護,可直接支持的Outlook,Outlook Express中的Windows Mail和其他電子郵件程序。



採用分層安全方法將允許 IT人員激勵現有的安全政策,並消除了潛在的麻煩和費用高昂的修理受損的IT系統。

Malware threats are increasing and Faronics has you covered

We bring you the strongest, most reliable, best of breed anti-virus solution. Meet the newest member of Faronics product family - Faronics Anti-Virus Enterprise.

Unlike traditional anti-virus solutions that are sluggish, and resource intensive, Faronics Anti-Virus provides high-performance, proactive endpoint malware protection. Best of all, it integrates seamlessly with Faronics Deep Freeze so you can update your definitions even while your workstations are protected in a Frozen state!

Conventional security suites are usually technologies that have been acquired over time and cobbled together to complement AV. Faronics Anti-Virus has been developed from the ground up and combines anti-virus, anti-spyware, and anti-rootkit technologies into a tightly integrated solution. Faronics Anti-Virus also provides advanced email protection, with direct support for Outlook, Outlook Express, Windows Mail and any other email program.

The need for a layered security strategy

With the number and complexity of malware threats steadily increasing, relying on a lone solutions is no longer enough.

Adopting a layered security approach will allows IT personnel to galvanize existing security policies and eliminates the potential headaches and high costs of repairing a compromised IT system.

Learn More>