Finding and removing malware |
Dual-engine virus and malware detection
|
|
|
|
Super fast system scans (1-2 min)
|
|
|
|
PUP/unwanted programs detection
|
|
|
|
Advanced infection cleaning
|
|
|
|
Safe quarantine of suspicious files
|
|
|
|
Scan exclusions/allow list
|
|
|
|
Scheduled scans
|
|
|
|
Windows Explorer integration
|
|
|
|
Command line interface included
|
|
|
|
Emergency Kit maker included
|
|
|
|
Preventing new infections |
Multi-layered real-time protection
|
|
|
|
Web Protection
|
|
|
|
Anti-phishing
|
|
|
|
Browser security
|
|
|
|
File Guard
|
|
|
|
Behavior Blocker
|
|
|
|
Anti-Ransomware
|
|
|
|
Exploit prevention
|
|
|
|
System manipulation prevention
|
|
|
|
Application hardening
|
|
|
|
Advanced Persistent Threat (APT) protection
|
|
|
|
Fileless malware protection
|
|
|
|
Targeted attack prevention
|
|
|
|
Botnet protection
|
|
|
|
False positives verification
|
|
|
|
Protection exclusions/allow list
|
|
|
|
Hourly automatic updates
|
|
|
|
Emergency network lockdown mode
|
|
|
|
Shutdown & uninstall prevention via password
|
|
|
|
Windows Firewall monitoring and hardening
|
|
|
|
Windows RDP attack detection
|
|
|
|
Endpoint detection and response (EDR) |
Suspicious behavior monitoring
|
On endpoint only |
On endpoint and in cloud. High-confidence events only |
On endpoint and in cloud. All confidence levels events |
Incidents retention time
|
|
365 days |
365 days |
Raw log data retention time
|
|
0 days |
30 days |
Local detections on devices
|
|
|
|
Quick allow/quarantine/block everywhere
|
|
|
|
Device isolation
|
|
|
|
Execution tree & timeline
|
|
|
|
MITRE ATT&CK tactics & techniques
|
|
|
|
Deep threat insights
|
|
|
|
Rollback
|
|
|
|
Workspace-wide threat hunting
|
|
|
|
Endpoint visibility with OSQuery
|
|
|
|
SOC/SIEM integration via Syslog
|
|
|
|
Centralized management |
Management Console included
|
Simplified |
Fully featured |
Fully featured |
Industry leading mirror view
|
|
|
|
Web access & mobile app
|
|
|
|
“Local only” management mode
|
|
|
|
“Local & remote” management mode
|
|
|
|
“Remote only” management mode
|
|
|
|
Traffic caching relay devices (multiple)
|
|
|
|
Incident investigation tools
|
|
|
|
Forensics & audit logs
|
|
|
|
Remote scans & quarantine
|
|
|
|
Device isolation
|
|
|
|
Device health & system overview
|
|
|
|
Email, webhook & push notifications
|
|
|
|
Advanced reporting
|
|
|
|
Logs and reports retention time
|
30 days |
180 days |
365 days |
Protection policies for device groups
|
|
|
|
Permission policies for user groups
|
|
|
|
Granular permissions for individual users
|
|
|
|
Maximum protection policies
|
10 |
10 |
Unlimited |
Maximum permission policies
|
10 |
10 |
Unlimited |
Maximum workspace managers
|
2 |
2 |
Unlimited |
Invite Emsisoft partners (MSPs) to manage workspace
|
|
|
|
REST Web API for all features
|
|
|
|
Task automation & Windows Server features |
Scheduled scans
|
|
|
|
Command line interface included
|
|
|
|
Email notifications for relevant events
|
|
|
|
Monitoring of file shares and connected storage
|
|
|
|
Protection without logged in users
|
|
|
|
Silent mode/gaming mode
|
|
|
|
Windows Server OS supported
|
|
|
|
Active Directory integration
|
|
|
|
Automatic detection of new devices
|
|
|
|
Remote deployment through relay devices
|
|
|
|
Dedicated Emsisoft benefits |
Money back guarantee
|
|
|
|
Malware removal assistance
|
|
|
|
Always get the latest version
|
|
|
|
Certified protection
|
|
|
|
Privacy conscious design
|
|
|
|
Email & live chat support
|
|
|
|
Skip-the-line priority support
|
|
|
|
Call-back service (8am-9pm ET)
|
|
|
|
|
See details |
See details |
See details |