 |
Security Expert Pro is built as a user interface for the core of the Cyberfort technology. It also has other components not directly related to the Cyberfort technology representing important tools to battle harmful programs. They include a built-in disassembler, tools for data processing in the hexadecimal format, components providing comprehensive information about the operating system and third-party software, search tools , etc. |
|
Control of the processes running on your computer. Intelligent recognition of software and control of its integrity. No execution of unknown software without your authorization. Automatic logging of all processes executed with detailed information about the timing of process execution, parent process, etc.The System Process Control is one of the key elements of the Cyberfort technology that allows to reliably protect the system from unauthorized start of a process, for example when you are surfing the Internet, protect your data and a privacy from hacker attacks, such as social engineering, drive-by-download, zero-day vulnerability exploitation, etc.
"Security Expert Pro" asks for your one-time authorization for the start of any unknown process.
|
Full control of any process on your system
Advanced logging capabilities
Three layers of execution protection
Unknown software alarm
Fast security reporting
List of trusted processes for high level protection
Easy access to the virtual memory of any process
Process snapshots for the comprehensive analysis of the internals
|
|
Any process executed by the operating system can be compromised as a result of a hacker attack. Even in the absence of hacker attacks, the executing process can create potential "holes" in security, for example by opening unwanted ports, loading undesirable executable code into own context, etc. The Process Compromising Control helps the user evaluate a potential level of threat posed by the process.
"Security Expert Pro" indicates the compromise level for each process as green, orange or red in the main window of the Security Navigator.
|
Keeps an easy to read register of security events taking place in the system
Uses more than 30 sensors detecting cybersecurity events
Fast security engine. Provides maximum functionality using minimum system resources
In real-time displays the level compromise for each process and helps you quickly and effectively address potential system
|
|
Together with the System Process Control, creates an insuperable barrier on the way of any malware that may want to gain control over your computer system. Simple and flexible system of network rules providing an adjustable network barrier for any malware. It is well known that even legitimate software can spy against you sending your data out without your consent. The Process Network Control allows you to detect and prevent such events in order to protect your privacy.
"Security Expert Pro" asks for your authorization of network traffic if network rules for the relevant process were not defined earlier |
Simple and flexible network management system for every process
Allows to set network rules for different instances of the same root executable
Maintains a log of all network connections to simplify analysis of possible security incidents
Suspends and informs of any suspicious network activity
Communicates with the Windows firewall
|
|
Deals with the most dangerous type of threat that allows malware to remain invisible. The Rootkit Activity Control reports any suspicious activity in the kernel of the operating system, e.g., changes in the System Descriptors Table, violation of integrity of core kernel components, etc.
Many antivirus software vendors use the SDT for their own purposes. Therefore, if you have an antivirus that intercepts SDT vectors, upon installing the Security Expert Pro you will receive a security alert due to the changes detected in the kernel of the operating system. Once this happens, check if all the SDT vectors intercepted are directed to the kernel module related to the antivirus software. If this is indeed the case, just approve them in the appropriate dialog |
Tracks changes in the operating system’s kernel and alerts of any suspicious activity. Allows to:
a) verify system components of the kernel at any moment
b) operate in the kernel’s virtual memory
c) restore the original vectors of the SDT
d) keep track on integrity of kernel components
Alert of suspicious activity in kernel level
Integrity control
|
|
Keeps track of changes in key components of the operating system, such as important parts of the system registry, file system and others, to prevent undesirable changes. Fulfills integrity check of system processes and user processes. |
Records changes in key components in the event log to provide for their subsequent recovery
Generates security events in case of integrity violation of a process or key components of the operating system |
|
|