Product Sold Out
If applicable customer can place a return/replacement request within 10 Days of order delivery.
In case of damaged/missing/wrong product or empty parcel, the return/replacement request should be placed within 2 days of delivery.
Know MoreProtegent 360 – Complete Security Software
Anti-virus| Internet Security and Total Security are common words describing security software| but only for Internet threats. The new buzz word| Complete Security is on priority from the broader aspect for individual users and enterprise users. Complete Security not only means protection from Internet Threats but also protection from data theft| unethical activity and physical theft.
The word “Protegent” is deciphered from protégée (“To Protect” – in French). Complete Security is what is offered in Unistal’s Protegent360. The software encompasses security from internet threats and data safety through its four modules which are Protegent Total Security| Activity Monitoring| Port Locker| Locate Laptop and Crash Proof. Protegent Total security is designed for countering internet threats. It is simple to use yet a sophisticated protection is guaranteed from all kinds of spywares| malwares| e-threats| rootkits and anti-phishing. Its enhanced vulnerability scanner (Inbuilt) has features for Resident Protection| E-mail Scanner| On-Demand Scanner| and Virus Vault for safe handling of files and automatic hourly updates. Protegent Total Security boasts of the world's biggest antivirus database engine.
Protegent 360 Modules
• Protegent Total Security
• Activity Reporter
• Port Locker & Data Leakage Prevention
• Locate Laptop & Data Encryption
• Crash Proof
Key Features
• Antivirus & Antispyware
• Antispam
• Wi-Fi Management
• File Shredder
• Tune-up
File Encryption
• Two-way Firewall
• Vulnerability Scanner
• Improved Search Advisor
• Personal Data Filter
• Antiphishing
• Silent Mode
• Scan Dispatcher
• Rescue Mode
• Virtualized Browser
• File Finder
• Registry Cleaner
• Hourly Update
• Safe Pay
• Block USB Port
• White listing of Authorized USB devices
• USB Read Only Feature
• Block/Unblock Single/All Ports
• E-mail Filtering
• Monitor Internet Activity
• Monitor Application Activity
• User wise reporting
• User login Reporting
• Monitor Working Log
• Monitor Keystrokes
• Monitor Screenshots
• Laptop/ User Tracking
• Automated Data Encryption
• Deleted File/Folder Recovery
• Un-format Formatted Drive
• Repair Corrupted/Deleted Partition
• Revive incase of FAT/MFT Corruption
System requirements
• Windows XP with Service Pack 3 (32-bit).
• Windows Vista with Service Pack 2.
• Windows 7 with Service Pack 1
• Windows 8
Minimum system requirements
• 1.8 GB available free hard disk space (at least 800 MB on the system drive)
• 800 MHz processor
• 1 GB of memory (RAM)
Recommended system requirements
• 2.8 GB available free hard disk space (at least 800 MB on the system drive)
• Intel CORE Duo (1.66 GHz) or equivalent processor
• Memory (RAM):
• 1 GB for Windows XP
• 1.5 GB for Windows Vista| Windows 7 and Windows 8
Software Specification | |
Type | : Antivirus |
More Details |
|
Maximum Retail Price (inclusive of all taxes) | Rs.1750 |
Common or Generic Name | - |
Net Contents / Net Quantity | - |
Manufacturer's Name and Address | - |
Packer's Name and Address | - |
Marketer's name and Address | - |
Importer's Name and Address | - |
Country of Origin / Manufacture / Assembly | India |