Product Details

ThreatFire (formerly Cyberhawk)



Cyberhawk - Next generation consumer security software: persistent zero-day threat protection made easy for everyone. Even novice users!
ThreatFire (formerly Cyberhawk) is a completely free software. You can free download and use it as long as you like.


Cyberhawk - Next generation consumer security software: persistent zero-day threat protection made easy for everyone.

Cyberhawk - Next generation consumer security software: persistent zero-day threat protection made easy for everyone. Even novice users! Comprehensive protection against viruses, spyware, trojans, intruders and other threats to PC security Cyberhawk does the work of antivirus, anti-spyware and firewall programs. For added peace of mind, Cyberhawk is designed to work alongside any current security programs you may already have installed there is no need to uninstall your antivirus, anti-spyware, firewall or other security program before installing Cyberhawk. Powered by Novatix's patent-pending ActiveDefense technology, Cyberhawk protects you with the highest level of out-of-the-box accuracy. No need to configure baffling, technical security settings: just turn Cyberhawk on and start blocking malware. Without false positives! Perpetually ready for the next malware outbreak, with no signature updates or user interaction required. Without impacting system performance, ThreatFire runs in the background. Always up-to-date thanks to the input provided by the online Cyberhawk Secure Community, a worldwide network of users who supply feedback on emerging threats and evolving malware. Here are some key features of "Cyberhawk": · Immediately Effective with No Complicated Set Up ThreatFire provides immediate protection out-of-the-box. There are no difficult configuration decisions, intimidating messaging, or time-consuming signature downloads. The easy-to-use program with its ActiveDefense technology does it all so you don't have to. · Proactive Defense against Both Known and Unknown Threats Traditional antivirus software offers strictly reactive protection. It can only protect you from a new threat after the threat has been discovered and new signatures to protect against it are developed, tested, and then released for download. ThreatFire does not rely on signatures to protect you; instead, it uses intelligent behavioral analysis to proactively hunt down and paralyze any activity or behavior that might compromise the security of a PC. ThreatFire keeps you safe between antivirus updates so you are always protected, no matter how new the threat. · NEW! Quarantine and Permanently Remove Threats from Your System ThreatFire now automatically quarantines all threats detected, whether known or unknown for your protection. After quarantining, you can choose to permanently delete the threats from your system. · NEW! Rootkit Scanner Seeks Out Deeply Hidden Files, Objects and Registry Keys Now available in the ThreatFire Free Edition, too! ThreatFire is constantly on the lookout for signs of hidden processes that are running on your system that might indicate the presence of a rootkit. If it detects a hidden process it will immediately terminate it and notify you. However, hidden processes are not the only indicators of a rootkit. A rootkit may contain several pieces and the Rootkit Scanner dives deeper into your system to seek out any hidden files, registry keys or other objects that may be part of a rootkit. If it finds anything, it gives you the option to quarantine the objects so that the rootkit is prevented from running. · Complementary to Your Existing Antivirus Software Since no single application is currently foolproof, a layered defense provides the most complete protection. ThreatFire is the perfect complement to your existing antivirus protection, and is fully compatible with your antivirus or other security programs. While the traditional programs will protect only against known threats included in their signatures until a new update is created, ThreatFire goes beyond and also protects against new or unknown zero-day threats. · NEW! Advanced Custom Configuration Options and Rules Settings Now available in ThreatFire Free Edition, too! ThreatFire now includes fully configurable Custom Rules to allow advanced protection settings according to your specific needs. Use the simple Rule Wizard to create fully outlined arguments for new rules you wish ThreatFire Pro to enforce. · Virtually No Impact on System Performance Even though ThreatFire runs constantly in the background while it watches for potentially malicious activity, it is very light on system resources. You ll hardly even know its running until it alerts you to a potential problem. · NEW! Built-in Web Search Provides Additional Threat Details Now available in ThreatFire Free Edition, too! All ThreatFire alerts now include a new quick link that when clicked performs a web search on the threat name. Easily access more data and background on the potential threats you encounter so that you can make more informed decisions on how to proceed. · Continually Improving Protection Technology ThreatFire users can elect to participate in the ThreatFire Secure Community to aid in identifying suspect files and threats. When ThreatFire observes suspect behavior on a PC, the event information is automatically reported to PC Tools for analysis through a secure and anonymous connection. So as threat strategies evolve and new security penetration tactics emerge, ThreatFires defenses remain at the forefront of the solutions that defeat those threats. · Technical Support Free email and web-based technical support is included with every download of ThreatFire. If you ever have a question or need assistance, just contact our technicians and theyll be happy to help you out. Requirements: · 15 MB of disk space · Some program functions require a connection to the Internet

(512k) 03 m 44 s
(1Mb) 01 m 52 s
(2Mb) 56 s
(5Mb) 23 s
(10Mb) 12 s

related terms
Related Software
Similar Download Catalog
a | b | c | d | e | f | g | h | i | j | k | l | m | n | o | p | q | r | s | t | u | v | w | x | y | z