PC Tools Releases ThreatFire 4.1
ThreatFire Provides Advanced, More Intuitive Behavioral Protection
San Francisco, February 19, 2009: PC Tools today announced the release of an update to its advanced, user-friendly behavioral-based security software, ThreatFire. Updating version 4.1 to include a smarter more intuitive alert system, an enhanced rootkit scanner to detect deeply hidden threats, improved detection capabilities, PC Tools continues to focus on providing advanced behavioral-based technology.
“As the malware threat landscape continues to evolve and become increasingly sophisticated, it is critical that consumers look for advanced security solutions that offer functionality and value for money” said Simon Clausen, Vice President, PC Tools.
PC Tools have focused on providing users with powerful proactive behavior-based protection against new and unknown threats, while ensuring a superior user experience.
“ThreatFire 4.1 combines best of breed behavior-based protection and intuitive threat handling, using patent pending technology to efficiently identify threat variants. The latest version also employs in-the-cloud black and white lists to automatically handle threats, significantly reducing user interaction”, said Clausen.
ThreatFire 4.1 has been designed with a simple and intuitive security software alert system that uses patent-pending technology and in-the-cloud black/white lists to ensure that both the number and the type of alerts that require users to make a decision are kept to a minimum.
- Focus on Behavioral Protection
As proactive behavior-based protection is most useful as a first line of defense (in addition to a traditional signature-based scanner), ThreatFire 4.1 now focuses on delivering best-of-breed behavioral protection and as a result no longer provides a signature-based virus scanner. Users requiring an anti-virus scanner can download PC Tools Anti-Virus for free at: - http://www.pctools.com/free-antivirus/
- Enhanced Rootkit Detection
ThreatFire 4.1 now employs unique technologies in its rootkit scanner to help protect users from deeply hidden threats.
Features as standard
Patent-pending ActiveDefense real-time technology to provide constant protection for known, unknown and new threats
Protects in the background with minimal impact on system resource usage
Advanced detection capabilities, including an advanced rootkit scanner and patent-pending technology to provide greater accuracy in detecting real threats and an increased ability to avoid false positives.
A Threat Detection map that indicates the geographical location and threat listings of recent malware detected within the ThreatFire User Community.
ThreatFire is available from http://www.threatfire.com/ for free for all home users and includes free email and web-based technical support. Businesses can purchase ThreatFire Pro for $US29.95 to receive full technical and phone support.
About ThreatFire and Behavior-based Protection
Unlike traditional antivirus products, ThreatFire does not rely on signatures for protection and there is no delay in providing protection against zero-day. Using an intelligent behavioral engine, ThreatFire is immediately effective against malware.
ThreatFire is fully integrated with the automated threat analysis system, ThreatExpert, which provides users with known threat updates within minutes of a threat being first seen. ThreatFire defends computers in real-time against threats such as spyware, viruses, worms, Trojans, rootkits, keyloggers, buffer overflows by examining and monitoring the behavior of files, background activities and processes.
Note to Editor
To detect malicious behavior, ThreatFire monitors and watches every file operation (creation, copy, deletion, etc.), every process creation, modification and termination, every network communication (inbound and outbound) and every interaction with critical components of the operating system (registry, etc.).
At the core of ThreatFire is a process behavior analysis engine coupled with a set of specific predefined security rules which describe what is unacceptable from a process behavior analysis. The rules cover a wide range of events related to file operations, network operations, and interactions with the operating system. Every event from every process is efficiently analyzed by ThreatFire. When a rule is triggered, ThreatFire can terminate the detected malicious process.
PC Tools recommend product reviewers refer to the PC Tools reviewer’s guide that provides detailed information relating to behavior-based testing methodologies and references a range of independent sources.
About PC Tools
PC Tools is a global software leader with a cache of security and utility products, including the multi award-winning Spyware Doctor®. PC Tools is an industry leader in real-time anti-spyware and has a number of key patents pending.
The PC Tools Malware Research Center monitors trends and emerging spyware issues and provides security solutions for the consumer and enterprise marketplace. The company is headquartered in Sydney, with offices in San Francisco, London, Shannon (Ireland), Melbourne, Kiev, and Boulder. PC Tools has a global network of distributors, resellers, and retailers.
Public Relations Manager
PC Tools Software
Phone: +61 (0) 2 8922 6394
Mobile: +61 410 541 562