Reposting by : Nathan Gusti Ryan

Posted by : Ardhiansyah Firdaus [ ardhiansyah@dchannel.co.id ]



Without MicroWorld WinSock Layer (MWL)
All incoming and outgoing mails, pass through the WinSock Layer at theserver level and the client level.

With MicroWorld WinSock Layer (MWL)
MWL sits on WinSock. All content passing through WinSock has tomandatorily pass through MWL, where it is checked for any securityviolating data. If such data occurs, it is removed and the clean datais passed on to the application.

MicroWorld’s revolutionary concept to tackle the Content Security threats
The overall business scenario is undergoing a rapid change withInformation Technology providing more advanced and rapid means ofbusiness communication like Internet and e-mails. However, as far asinformation that is being made available across the computer systems isconcerned, there is a race to restrict its access, guard againstinformation abuse and protect the valuable content.

MicroWorld’s revolutionary concept to tackle the Content Security threats
The overall business scenario is undergoing a rapid change withInformation Technology providing more advanced and rapid means ofbusiness communication like Internet and e-mails. However, as far asinformation that is being made available across the computer systems isconcerned, there is a race to restrict its access, guard againstinformation abuse and protect the valuable content.

Virus-pranksters are now using the Internet as a frictionlessdistribution channel for dangerous viruses and worms. Over the years,contemporary virus threats have transformed into content securitythreats. These comprise e-mail and web-based virus downloads, MS Wordbased macro bombs, offensive e-mail and web content, misuse / abuse ofe-mail resources, junk mail and Spam infections, harmful Java orActiveX applets, intrusion of anonymous Internet users and trespassingof unauthorized bodies into the company’s internal network.

Thesethreats not only damage files and computers by acting as viral agents,but also impose productivity losses, wasting disk space, time andfinancial resources. Ironically, even as certain methods to guardContent Security have evolved, threats to security have become moresevere, even causing destruction of data. However, the systems employedto detect these threats are still handicapped by several deficiencies.The “cure” that is provided by other products only scans data after itis saved on the hard disk; by which time the damage is already done.

The “MicroWorld-WinSock Layer” (MWL) is a revolutionary concept inscanning Internet traffic on a real-time basis. This new concept haschanged the manner in which Content Security threats are tackled in theknowledge world.

MWL is revolutionary because unlike the other products andtechnologies, currently available, MWL tackles a threat before itreaches your applications. Other products deal with the threat afterthe applications have already processed it.

Technically, MWL is placed above the WinSock layer and acts as a”Transparent Gatekeeper” on the WinSock layer of the operating system.All data packets coming on different TCP/IP ports are assembled. Itthen decodes e-mail and web traffic, FTP and ICQ traffic along with allthe attachments and passes them through numerous filters such as VirusFilters, Content Filters, Attachment Filters, etc. These filters checkvalidity of the file’s content and issue dynamic notifications.

MWL technology oversees all data flowing to-and-from the Internet,thereby allowing it to process it without interfering with theapplications. Dynamic compression and decompression facilities of dataflow, between the Internet and your computer in order to maximizeeffective bandwidth usage are thus provided by MWL.

Host Intrusion Prevention System (HIPS)
The Host Intrusion Prevention System (HIPS) monitors all the networkactivities on the system. This technology helps in detecting when arootkit, keylogger, spyware or Trojan is installed on the system. HIPStechnology not only warns the user about any intrusion, but, alsoblocks it.

HIPS technology uses both signature based detection as well as advancedheuristics antivirus algorithm. You can also set policies specifyingthe behavior of operating systems or applications. The attacks thatHIPS protect against include viruses, spam, spyware, worms, Trojans,keyloggers, bots, rootkits, and Denial of Service (DoS) and DistributedDenial of Service (DDoS) attacks.

Domain & IP Reputation Check
TheDomain & IP Reputation Check technology verifies the credibility ofWeb domains by tracking any indication of suspicious activities on theweb page. This technology also verifies the integrity of the IP addressby comparing it with a list of known email senders and by using adynamic service that assesses email senders reputation in real-time.Emails received from domains with malicious activities are notaccepted.

Non Intrusive Learning Pattern (NILP) Technology
NILP works on the basis of Artificial Intelligence where in, it learnsuser’s behavior and then takes an informed decision in the backgroundand help identify and classify mails on behalf of the users whether themails are spam or ham.

INFO PENTING :

http://download1.escanav.com/wiki/index.php/EScan_for_Windows_v10

http://www.escan.co.id

http://www.escanav.com

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s