Finding and removing malware |
Dual-engine virus and malware detection | | | |
Super fast system scans (1-2 min) | | | |
PUP/unwanted programs detection | | | |
Advanced infection cleaning | | | |
Safe quarantine of suspicious files | | | |
Scan exclusions/allow list | | | |
Scheduled scans | | | |
Windows Explorer integration | | | |
Command line interface included | | | |
Emergency Kit maker included | | | |
Preventing new infections |
Multi-layered real-time protection | | | |
Web Protection | | | |
Anti-phishing | | | |
Browser security | | | |
File Guard | | | |
Behavior Blocker | | | |
Anti-Ransomware | | | |
Exploit prevention | | | |
System manipulation prevention | | | |
Application hardening | | | |
Advanced Persistent Threat (APT) protection | | | |
Fileless malware protection | | | |
Targeted attack prevention | | | |
Botnet protection | | | |
False positives verification | | | |
Protection exclusions/allow list | | | |
Hourly automatic updates | | | |
Emergency network lockdown mode | | | |
Shutdown & uninstall prevention via password | | | |
Windows Firewall monitoring and hardening | | | |
Windows RDP attack detection | | | |
Endpoint detection and response (EDR) |
Suspicious behavior monitoring | On endpoint only | On endpoint and in cloud. High-confidence events only | On endpoint and in cloud. All confidence levels events |
Incidents retention time | | 365 days | 365 days |
Raw log data retention time | | 0 days | 30 days |
Local detections on devices | | | |
Quick allow/quarantine/block everywhere | | | |
Device isolation | | | |
Execution tree & timeline | | | |
MITRE ATT&CK tactics & techniques | | | |
Deep threat insights | | | |
Rollback | | | |
Workspace-wide threat hunting | | | |
Endpoint visibility with OSQuery | | | |
SOC/SIEM integration via Syslog | | | |
Centralized management |
Management Console included | Simplified | Fully featured | Fully featured |
Industry leading mirror view | | | |
Web access & mobile app | | | |
“Local only” management mode | | | |
“Local & remote” management mode | | | |
“Remote only” management mode | | | |
Traffic caching relay devices (multiple) | | | |
Incident investigation tools | | | |
Forensics & audit logs | | | |
Remote scans & quarantine | | | |
Device isolation | | | |
Device health & system overview | | | |
Email, webhook & push notifications | | | |
Advanced reporting | | | |
Logs and reports retention time | 30 days | 180 days | 365 days |
Protection policies for device groups | | | |
Permission policies for user groups | | | |
Granular permissions for individual users | | | |
Maximum protection policies | 10 | 10 | Unlimited |
Maximum permission policies | 10 | 10 | Unlimited |
Maximum workspace managers | 2 | 2 | Unlimited |
Invite Emsisoft partners (MSPs) to manage workspace | | | |
REST Web API for all features | | | |
Task automation & Windows Server features |
Scheduled scans | | | |
Command line interface included | | | |
Email notifications for relevant events | | | |
Monitoring of file shares and connected storage | | | |
Protection without logged in users | | | |
Silent mode/gaming mode | | | |
Windows Server OS supported | | | |
Active Directory integration | | | |
Automatic detection of new devices | | | |
Remote deployment through relay devices | | | |
Dedicated Emsisoft benefits |
Money back guarantee | | | |
Malware removal assistance | | | |
Always get the latest version | | | |
Certified protection | | | |
Privacy conscious design | | | |
Email & live chat support | | | |
Skip-the-line priority support | | | |
Call-back service (8am-9pm ET) | | | |
| See details | See details | See details |