protegent 360 complete security antivirus with data recovery software

6
Protegent 360- Complete Anti-vir security security enterpr Threats theft! The wo Comple encomp Securit SysBoost. Pro simple to use yet a sophisticated pro phishing. Protegent internet security b The real challenge is to take maximu keep our machine safe from unethica us in keeping the log of complete wo activities and sends reports directly of their staff by 20% as now they restricting them not to do personal ch Do we parents need to monitor our te the nagging type now as they can ha internet activities via Protegent 360’s Keeping your data safe and protected we require Controlling, monitoring a leakage prevention module allows y data theft. This module is also equip authorized by the organization. You your organization. In case if the laptop is lost, missing o connected to Internet. Its ability to f helps in physical theft prevention o time, this module automatically encry The Crash Proof / Data Loss Preventi of our systems data, Image of file Software is designed to keep the im regular intervals. te Security Software “It’s Time to Think Bey rus, Internet Security and total security are commo y software, but only for Internet threats. The new b y is on priority from the broader aspect for in rise users. Complete Security not only means prote s but also Protection from data theft, unethical ac ord “Protegent” is deciphered from protégée (“To P ete security is what is offered in Unistal’s Proegen passes internet threats and data safety through its six ty, Activity Monitoring, Port Locker, Locate Lapto otegent Total security designed for countering I otection for all kinds of spyware, malware, e-threats boasts of the world biggest antivirus database engine um efficiency from your subordinates. It has also b al Activities in our absence. Activity Monitoring an ork done on a computer. This module reports all the u to your email. This also helps the organizations to e are aware that the entire work log is going via hat, web browsing, playing games etc. eens and pre-teens? It’s a debatable question. But pa ave tools that could assist them through monitoring s Activity Monitoring & Reporting module. ed is a challenge for each individual and organizatio and preventing the flow of data from the computer. you to protect the flow of data from all the ports le pped with email filtering, so user can not send files/ can make Pen drives white listed or read only for th or stolen, Locate Laptop module helps in finding it find out the location from the IP with which it is co of the Laptop. If Laptop does not get connected to Int ypts the important data folder and makes it unusable tion feature of Protegent complete security software e. Crash Proof helps the user to keep the updated b mage of the file indexes/ disk properties and it keep yond Anti-Virus” on words describing buzz word, complete ndividual users and ection from Internet ctivity and physical Protect”–in French). nt360. Protegent360 x modules, Internet op, Crash Proof and Internet threats is s, root kit and Anti- e. become important to nd Reporting helps unethically defined enhance the activity email to their boss arents need not be of g all their computer/ on. In today’s world . Port locker a data eaving no chance of mails which are not he computers within t the moment it gets onnected to Internet ternet for a specified for others. e creates the image backup of data. This ps updating them at

Upload: jennifer-martin

Post on 20-Jan-2017

26 views

Category:

Software


1 download

TRANSCRIPT

Page 1: Protegent 360 Complete Security Antivirus With Data Recovery Software

Protegent 360- Complete Security Software

Anti-virus, Internet Security and total security are common words describing

security software, but only

security is on priority from the broader aspect for individual users and

enterprise users. Complete Security not only means protection from Internet

Threats but also Protection from data theft, unethical ac

theft!

The word “Protegent” is deciphered from protégée (“To Protect”

Complete security is what is offered in Unistal’s Proegent360. Protegent360

encompasses internet threats and data safety through its six modules, Internet

Security, Activity Monitoring, Port Locker, Locate Laptop, Crash Proof and

SysBoost. Protegent Total

simple to use yet a sophisticated protection for all

phishing. Protegent internet security boasts of the world biggest antivirus database engine.

The real challenge is to take maximum efficiency from your subordinates. It has also become important to

keep our machine safe from unethical Activities i

us in keeping the log of complete work done on a computer.

activities and sends reports directly to your email. This also helps the organizations to enha

of their staff by 20% as now they are aware that the entire work log is going via email to their boss

restricting them not to do personal chat, web browsing, playing games etc.

Do we parents need to monitor our teens and pre

the nagging type now as they can have tools that could assist them through monitoring all their computer/

internet activities via Protegent 360’s

Keeping your data safe and protected is a challenge for each individual and organization. In today’s world

we require Controlling, monitoring and preventing the flow of data from the computer.

leakage prevention module allows you to protect the flow of data fr

data theft. This module is also equipped with email filtering, so user can not send files/ mails which are not

authorized by the organization. You can make Pen drives white listed or read only for the computers within

your organization.

In case if the laptop is lost, missing or stolen,

connected to Internet. Its ability to find out the location from the IP with which it is connected to Internet

helps in physical theft prevention of the Laptop. If Laptop does not get connected to Internet for a specified

time, this module automatically encrypts the important data folder and makes it unusable for others.

The Crash Proof / Data Loss Prevention feature of

of our systems data, Image of file.

Software is designed to keep the image of the file indexes/ disk properties and it keeps updating them at

regular intervals.

Complete Security Software

“It’s Time to Think Beyond Anti

virus, Internet Security and total security are common words describing

security software, but only for Internet threats. The new buzz word, complete

security is on priority from the broader aspect for individual users and

enterprise users. Complete Security not only means protection from Internet

Threats but also Protection from data theft, unethical ac

The word “Protegent” is deciphered from protégée (“To Protect”

Complete security is what is offered in Unistal’s Proegent360. Protegent360

encompasses internet threats and data safety through its six modules, Internet

Security, Activity Monitoring, Port Locker, Locate Laptop, Crash Proof and

Protegent Total security designed for countering Internet threats

simple to use yet a sophisticated protection for all kinds of spyware, malware, e-threats, root kit

phishing. Protegent internet security boasts of the world biggest antivirus database engine.

The real challenge is to take maximum efficiency from your subordinates. It has also become important to

keep our machine safe from unethical Activities in our absence. Activity Monitoring and Reporting

us in keeping the log of complete work done on a computer. This module reports all the unethically defined

and sends reports directly to your email. This also helps the organizations to enha

of their staff by 20% as now they are aware that the entire work log is going via email to their boss

restricting them not to do personal chat, web browsing, playing games etc.

Do we parents need to monitor our teens and pre-teens? It’s a debatable question. But parents need not be of

the nagging type now as they can have tools that could assist them through monitoring all their computer/

internet activities via Protegent 360’s Activity Monitoring & Reporting module.

and protected is a challenge for each individual and organization. In today’s world

we require Controlling, monitoring and preventing the flow of data from the computer.

leakage prevention module allows you to protect the flow of data from all the ports leaving no chance of

. This module is also equipped with email filtering, so user can not send files/ mails which are not

authorized by the organization. You can make Pen drives white listed or read only for the computers within

In case if the laptop is lost, missing or stolen, Locate Laptop module helps in finding it the moment it gets

connected to Internet. Its ability to find out the location from the IP with which it is connected to Internet

of the Laptop. If Laptop does not get connected to Internet for a specified

time, this module automatically encrypts the important data folder and makes it unusable for others.

The Crash Proof / Data Loss Prevention feature of Protegent complete security software creates the

of our systems data, Image of file. Crash Proof helps the user to keep the updated backup of data. This

Software is designed to keep the image of the file indexes/ disk properties and it keeps updating them at

“It’s Time to Think Beyond Anti-Virus”

virus, Internet Security and total security are common words describing

for Internet threats. The new buzz word, complete

security is on priority from the broader aspect for individual users and

enterprise users. Complete Security not only means protection from Internet

Threats but also Protection from data theft, unethical activity and physical

The word “Protegent” is deciphered from protégée (“To Protect”–in French).

Complete security is what is offered in Unistal’s Proegent360. Protegent360

encompasses internet threats and data safety through its six modules, Internet

Security, Activity Monitoring, Port Locker, Locate Laptop, Crash Proof and

Internet threats is

threats, root kit and Anti-

phishing. Protegent internet security boasts of the world biggest antivirus database engine.

The real challenge is to take maximum efficiency from your subordinates. It has also become important to

Monitoring and Reporting helps

unethically defined

and sends reports directly to your email. This also helps the organizations to enhance the activity

of their staff by 20% as now they are aware that the entire work log is going via email to their boss

debatable question. But parents need not be of

the nagging type now as they can have tools that could assist them through monitoring all their computer/

and protected is a challenge for each individual and organization. In today’s world

we require Controlling, monitoring and preventing the flow of data from the computer. Port locker a data

leaving no chance of

. This module is also equipped with email filtering, so user can not send files/ mails which are not

authorized by the organization. You can make Pen drives white listed or read only for the computers within

module helps in finding it the moment it gets

connected to Internet. Its ability to find out the location from the IP with which it is connected to Internet

of the Laptop. If Laptop does not get connected to Internet for a specified

time, this module automatically encrypts the important data folder and makes it unusable for others.

software creates the image

Crash Proof helps the user to keep the updated backup of data. This

Software is designed to keep the image of the file indexes/ disk properties and it keeps updating them at

Page 2: Protegent 360 Complete Security Antivirus With Data Recovery Software

Sysboost is system tune-up software which is easy to use and developed for Microsoft Windows which

helps to manage, maintain, and optimize

performance by cleaning junk registry, junk files and folders, temporary internet files and by performing

defragmentation of drives.

Unistal’s Protegent360, the complete security software covers all the six aspects of complete security.

is feature rich software beyond comparison. Protegent powers up 60% more features than any other nearest

competitive software. The free trail software can be downloaded from

details contact [email protected]

Description and Features of Protegent360 Modules

Protegent Total Security

Protegent Total Security keeps your Internet

end proactive protection from deadliest

Security is time tested antivirus solution and known for its superior quality and effectiveness. Its hourly

virus signature update module always protects you from latest viruses.

Antivirus & Antispyware Protegent protects your computer from all kinds of Viruses, Trojans,

Spywares, Rootkits,

and healthy.

Antispam Antispam feature blocks unwanted mails before it reaches your Inbox.

Entertainment Mode Entertainment Mode temporarily modifies protection settings. It

minimizes their impact on system performance.

Setting Protection Setting protection feature helps you to protect your settings with a

password, So that no one can change o

other user has the admin rights.

Active Virus Control Active Virus Control continuously monitors the applications running on

the computer. It looks for malware and other unethical objects.

Hourly Update Protegent Total

our system from new viruses

Personal Data Filter Prevents critical data, such as your social security number, from leaving

your computer.

Web Control Protect against online risk and block internet c

USB Block/Protection Combats or blocks USB device auto

block USB access.

software which is easy to use and developed for Microsoft Windows which

and optimize a computer system. It improves booted

performance by cleaning junk registry, junk files and folders, temporary internet files and by performing

, the complete security software covers all the six aspects of complete security.

is feature rich software beyond comparison. Protegent powers up 60% more features than any other nearest

competitive software. The free trail software can be downloaded from www.protegent360.com

ails contact [email protected].

Description and Features of Protegent360 Modules

keeps your Internet-connected family safe. The antivirus solution provides

end proactive protection from deadliest viruses, spyware, hackers and other e-threats. Protegent internet

Security is time tested antivirus solution and known for its superior quality and effectiveness. Its hourly

virus signature update module always protects you from latest viruses.

Protegent protects your computer from all kinds of Viruses, Trojans,

Spywares, Rootkits, and Malwares. It helps you to keep your system clean

and healthy.

Antispam feature blocks unwanted mails before it reaches your Inbox.

Entertainment Mode temporarily modifies protection settings. It

minimizes their impact on system performance.

Setting protection feature helps you to protect your settings with a

password, So that no one can change or modify the settings even if the

other user has the admin rights.

Active Virus Control continuously monitors the applications running on

the computer. It looks for malware and other unethical objects.

Protegent Total Security software takes updates every hour and protects

our system from new viruses

Prevents critical data, such as your social security number, from leaving

your computer.

Protect against online risk and block internet clutter.

Combats or blocks USB device auto-run vulnerability and you can also

block USB access.

software which is easy to use and developed for Microsoft Windows which

booted time and overall

performance by cleaning junk registry, junk files and folders, temporary internet files and by performing

, the complete security software covers all the six aspects of complete security. This

is feature rich software beyond comparison. Protegent powers up 60% more features than any other nearest

www.protegent360.com. For more

connected family safe. The antivirus solution provides high-

threats. Protegent internet

Security is time tested antivirus solution and known for its superior quality and effectiveness. Its hourly

Protegent protects your computer from all kinds of Viruses, Trojans,

. It helps you to keep your system clean

Antispam feature blocks unwanted mails before it reaches your Inbox.

Entertainment Mode temporarily modifies protection settings. It

Setting protection feature helps you to protect your settings with a

r modify the settings even if the

Active Virus Control continuously monitors the applications running on

the computer. It looks for malware and other unethical objects.

Security software takes updates every hour and protects

Prevents critical data, such as your social security number, from leaving

run vulnerability and you can also

Page 3: Protegent 360 Complete Security Antivirus With Data Recovery Software

Anti-Phishing Anti

scams and personal data phishing attempts.

File and Folder Block File and Folder block feature will make your personal file and folder

inaccessible without

One Click Removable Device

Scan Protegent Total Security will instantly monitors your USB as soon as you

plugged it in your

Website and Add Blocking Blocks Website & Ad on the basis of keyword and names as defined by

the user.

Activity Monitoring & Reporting

Activity Reporter is a very important tool to monitor the activities of all computer users. It records and

reports every key stroke/ every activity on the computer or internet and report is generated and emailed on

regular basis. The unique feature of Activity Reporter

you to monitor more effectively. The v

reporting would ensure monitoring is effective and keep the network more secured. The features of

Reporter would definitely act as a foil for anyone to do any fraudulent activities in

the user to find out if any unwanted activity has taken place in his absence. It also helps parents to find out

the activity of their children to guide them to right direction.

Monitor Internet Activity

Captures all Internet activity with features of Blacklist and White list

Black

monitored and be visible in alerts.

White list

not visible in alerts.

Monitor Screenshots Capture the Screen shot within a specified time Interval or on every mouse

click.

Monitor Keystrokes Captures all key strokes. Intercept DOS

Monitor Application Activity

Captures all system application activity with features of Blacklist and

White list

Black

and be visible in alerts.

White list

ignored and not visible in alerts.

Monitor Chat Activity Captures ICQ, Miranda, Skype, Google Talk , MSN, AIM, AOL, Yahoo,

QIP Chats

Monitor Clipboard Activity Captures Clipboard content

Anti-phishing feature blocks all the web pages which are supporting virus

scams and personal data phishing attempts.

File and Folder block feature will make your personal file and folder

inaccessible without user’s permission.

Protegent Total Security will instantly monitors your USB as soon as you

plugged it in your system.

Blocks Website & Ad on the basis of keyword and names as defined by

the user.

Activity Monitoring & Reporting

is a very important tool to monitor the activities of all computer users. It records and

reports every key stroke/ every activity on the computer or internet and report is generated and emailed on

Activity Reporter to White list and black list applications would enable

you to monitor more effectively. The various options of reporting along with the different formats of

reporting would ensure monitoring is effective and keep the network more secured. The features of

would definitely act as a foil for anyone to do any fraudulent activities in the organization. It helps

the user to find out if any unwanted activity has taken place in his absence. It also helps parents to find out

the activity of their children to guide them to right direction.

Captures all Internet activity with features of Blacklist and White list

Black list- Internet activities (web sites) which are added in this list are

monitored and be visible in alerts.

White list- Internet activities which are added in this list are igno

not visible in alerts.

Capture the Screen shot within a specified time Interval or on every mouse

click.

Captures all key strokes. Intercept DOS-box and Java –

aptures all system application activity with features of Blacklist and

White list

Black list- All the application activities that are added will get captured

and be visible in alerts.

White list- All the application activities that are added in this

ignored and not visible in alerts.

Captures ICQ, Miranda, Skype, Google Talk , MSN, AIM, AOL, Yahoo,

QIP Chats

Captures Clipboard content

phishing feature blocks all the web pages which are supporting virus

File and Folder block feature will make your personal file and folder

Protegent Total Security will instantly monitors your USB as soon as you

Blocks Website & Ad on the basis of keyword and names as defined by

is a very important tool to monitor the activities of all computer users. It records and

reports every key stroke/ every activity on the computer or internet and report is generated and emailed on

list applications would enable

arious options of reporting along with the different formats of

reporting would ensure monitoring is effective and keep the network more secured. The features of Activity

the organization. It helps

the user to find out if any unwanted activity has taken place in his absence. It also helps parents to find out

Captures all Internet activity with features of Blacklist and White list

Internet activities (web sites) which are added in this list are

Internet activities which are added in this list are ignored and

Capture the Screen shot within a specified time Interval or on every mouse

–chat Keystrokes.

aptures all system application activity with features of Blacklist and

All the application activities that are added will get captured

All the application activities that are added in this list, are

Captures ICQ, Miranda, Skype, Google Talk , MSN, AIM, AOL, Yahoo,

Page 4: Protegent 360 Complete Security Antivirus With Data Recovery Software

User Login Reporting You can get the login and logout

User wise Reporting You can get reports of each and every user account by their user name.

Port Locker

Port Locker allows the user to safeguard data/files from unauthorized access. It prevents vital &

data to be transferred from one PC to another using

ports, Printer ports, Infrared ports and Bluetooth ports

multiple ports with authorized password. It allows user to lock ports with

permanent, specific time duration (scheduled block)

displays the alert as soon as an unauthorized action is performed against the lo

complete log related to Permanent Blocked, Schedule Blocked or Un

including changes in settings, locking and unlocking the ports, setting scheduler etc. Users can White

one or more pen drives to be allowed on the system. You can also make your USB port read only so data can

only be transferred from pen drive to system. It provides the file transfer log through USB ports.

Block ports You can block all the ports with the help of Port Locker, to

system from unauthorized access. You can block USB port, Bluetooth

port, Infrared port, IEEE 1394 port, Network Adaptors port.

White listing of Authorized

USB devices Unique feature of White listing the authorized USB by using unique

hardwar

USB read only feature Option of assigning USB read only setting to white listed and non white

listed USB mass storage device.

File Transfer logs from & to

USB

File transfer logs will show the reports of file transferred to and from US

device and also show the reports of file added, removed, renamed &

modified.

Block /Unblock as per

schedule or block port when

system idle

Multiple or Single ports can be

you leave your system idle. Only

using the

Block CD/DVD Removable or Inbuilt CD/DVD ROM can be blocked by blocking

CD/DVD ROM port, no one will be able to read or write the CD/DVD

from the system.

Block Printer No Print command will work

Block/Unblock Single/All

Ports You can block/ unblock Multiple or single port in one shot.

You can get the login and logout details of each and every user

You can get reports of each and every user account by their user name.

Port Locker allows the user to safeguard data/files from unauthorized access. It prevents vital &

data to be transferred from one PC to another using Flash drive, DVD/CD writers, PCMCIA

Infrared ports and Bluetooth ports. It provides the Options to lock/unlock single or

sword. It allows user to lock ports with different lock type options

specific time duration (scheduled block) and when the computer remains idle or untouched

displays the alert as soon as an unauthorized action is performed against the locked

complete log related to Permanent Blocked, Schedule Blocked or Un-Blocked Ports with actions performed

including changes in settings, locking and unlocking the ports, setting scheduler etc. Users can White

s to be allowed on the system. You can also make your USB port read only so data can

only be transferred from pen drive to system. It provides the file transfer log through USB ports.

You can block all the ports with the help of Port Locker, to

system from unauthorized access. You can block USB port, Bluetooth

port, Infrared port, IEEE 1394 port, Network Adaptors port.

Unique feature of White listing the authorized USB by using unique

hardware ID of the device.

Option of assigning USB read only setting to white listed and non white

listed USB mass storage device.

File transfer logs will show the reports of file transferred to and from US

device and also show the reports of file added, removed, renamed &

modified.

Multiple or Single ports can be blocked permanently, scheduled

you leave your system idle. Only authorized user can unblock the Port by

using the password.

Removable or Inbuilt CD/DVD ROM can be blocked by blocking

CD/DVD ROM port, no one will be able to read or write the CD/DVD

from the system.

No Print command will work when Printer port is blocked.

You can block/ unblock Multiple or single port in one shot.

details of each and every user

You can get reports of each and every user account by their user name.

Port Locker allows the user to safeguard data/files from unauthorized access. It prevents vital & important

PCMCIA ports, Ethernet

lock/unlock single or

different lock type options as

computer remains idle or untouched. It

cked ports. It provides

Blocked Ports with actions performed

including changes in settings, locking and unlocking the ports, setting scheduler etc. Users can White list

s to be allowed on the system. You can also make your USB port read only so data can

only be transferred from pen drive to system. It provides the file transfer log through USB ports.

You can block all the ports with the help of Port Locker, to prevent your

system from unauthorized access. You can block USB port, Bluetooth

port, Infrared port, IEEE 1394 port, Network Adaptors port.

Unique feature of White listing the authorized USB by using unique

Option of assigning USB read only setting to white listed and non white

File transfer logs will show the reports of file transferred to and from USB

device and also show the reports of file added, removed, renamed &

scheduled or even if

authorized user can unblock the Port by

Removable or Inbuilt CD/DVD ROM can be blocked by blocking

CD/DVD ROM port, no one will be able to read or write the CD/DVD

when Printer port is blocked.

You can block/ unblock Multiple or single port in one shot.

Page 5: Protegent 360 Complete Security Antivirus With Data Recovery Software

Locate Laptop

Locate Laptop keeps a track of laptop's location whenever laptop gets connected to internet. What is

not just the laptop, but also the valuable, sensitive and creative data in it. It contains a smart agent, designed

to collect and transmit critical data needed to pinpoint its location to identify the unauthorized user in case of

a theft. It works in a stealth mode and can also silently inform you, about the location of your employee's

laptop! Predefined settings allow the user to encrypt classified files and folders whenever laptop is not

connected to internet for specified period or is detected stolen. It pro

to monitor the Location, IP Address, and Internet Service Provider with date and time. It allow user to

submit Theft Report online and provides regular Status Updates of laptop location on email.

Laptop/ User Tracking Secure Webpage for every user to Keep (monitor) a

movement of person with the

Automated Data Encryption Remotely launch the data encryption module on predefined sensitive files

and folders. Encrypts D

particular period.

Tamper Proof Reporting Reports on server contain information on date, time, Public IP. Location,

country, state, city, ISP, Longitude & Latitude. No human intervention for

reports.

Crash Proof

Crash Proof software helps the user to keep the updated backup of the data. This software

the images of the file indexes/ disk properties and keeps updating them at regular intervals. In this business

/Organization world the data volume has raised so that computer dependency grown. As the dependency

grows the down time increase as well due to data loss and the data lost cost us more than the recreation cost.

Data recovery cannot provide you the satisfactory result every time. So t

software that can help users to keep the image of the data. Crash proof takes the image of your data in a

regular interval and this information stored in a protected area. So the users use that data as per their need.

You can recover your lost files due to help of this software and you can un

Features:-

Deleted file/ folder recovery

Unformat formatted drives

Repair Corrupted / Deleted

Partition

Revive in case of FAT/MFT

Corruption

keeps a track of laptop's location whenever laptop gets connected to internet. What is

just the laptop, but also the valuable, sensitive and creative data in it. It contains a smart agent, designed

to collect and transmit critical data needed to pinpoint its location to identify the unauthorized user in case of

mode and can also silently inform you, about the location of your employee's

laptop! Predefined settings allow the user to encrypt classified files and folders whenever laptop is not

connected to internet for specified period or is detected stolen. It provides a secure web page for every user

to monitor the Location, IP Address, and Internet Service Provider with date and time. It allow user to

submit Theft Report online and provides regular Status Updates of laptop location on email.

Secure Webpage for every user to Keep (monitor) a

movement of person with the designated laptop e.g. company employee.

Remotely launch the data encryption module on predefined sensitive files

and folders. Encrypts Data even if laptop is not connected to Internet for

particular period.

Reports on server contain information on date, time, Public IP. Location,

country, state, city, ISP, Longitude & Latitude. No human intervention for

reports.

software helps the user to keep the updated backup of the data. This software

the images of the file indexes/ disk properties and keeps updating them at regular intervals. In this business

volume has raised so that computer dependency grown. As the dependency

grows the down time increase as well due to data loss and the data lost cost us more than the recreation cost.

Data recovery cannot provide you the satisfactory result every time. So the users have the requirement of

software that can help users to keep the image of the data. Crash proof takes the image of your data in a

regular interval and this information stored in a protected area. So the users use that data as per their need.

an recover your lost files due to help of this software and you can un-format any lost drive.

The software supports deleted file /folder recovery. It can recover the

deleted/ lost files if they are deleted from your PC , even if they are not

present in recycle bin.

The software can even unformat the whole drive. With th

product the user can revive the file system from its replica, which is

stored in some other location of the hard disk.

With this software you can repair or build back the corrupted/ deleted

partition, which may occur due to virus attacks or accidental deletion.

The software has a feature to build back your FAT/ MFT file system. It

supports 100% recovery in case your file system gets corrupt.

keeps a track of laptop's location whenever laptop gets connected to internet. What is lost is

just the laptop, but also the valuable, sensitive and creative data in it. It contains a smart agent, designed

to collect and transmit critical data needed to pinpoint its location to identify the unauthorized user in case of

mode and can also silently inform you, about the location of your employee's

laptop! Predefined settings allow the user to encrypt classified files and folders whenever laptop is not

vides a secure web page for every user

to monitor the Location, IP Address, and Internet Service Provider with date and time. It allow user to

submit Theft Report online and provides regular Status Updates of laptop location on email.

Secure Webpage for every user to Keep (monitor) a close eye on

designated laptop e.g. company employee.

Remotely launch the data encryption module on predefined sensitive files

ata even if laptop is not connected to Internet for

Reports on server contain information on date, time, Public IP. Location,

country, state, city, ISP, Longitude & Latitude. No human intervention for

software helps the user to keep the updated backup of the data. This software designed to keep

the images of the file indexes/ disk properties and keeps updating them at regular intervals. In this business

volume has raised so that computer dependency grown. As the dependency

grows the down time increase as well due to data loss and the data lost cost us more than the recreation cost.

he users have the requirement of

software that can help users to keep the image of the data. Crash proof takes the image of your data in a

regular interval and this information stored in a protected area. So the users use that data as per their need.

format any lost drive.

The software supports deleted file /folder recovery. It can recover the

deleted/ lost files if they are deleted from your PC , even if they are not

The software can even unformat the whole drive. With the help of this

product the user can revive the file system from its replica, which is

With this software you can repair or build back the corrupted/ deleted

which may occur due to virus attacks or accidental deletion.

The software has a feature to build back your FAT/ MFT file system. It

supports 100% recovery in case your file system gets corrupt.

Page 6: Protegent 360 Complete Security Antivirus With Data Recovery Software

SysBoost

The SysBoost feature of Protegent complete security software helps you to manage, maintain, and optimize

your computer system. SysBoost consist of six features which are Select and Wipe, Select Extensions,

Defrag Drive, Internet Wipe, Registry Clean and Re

system by deleting junk registries, junk

using this backup files can be restored .SysBoost analyses the system and brings out all the

registries.

Select and Wipe

Select Extensions

Defrag Drive

Internet Wipe

Registry Clean

Registry Restore

System Requirements

Supported Operating Systems

Windows XP (SP 2), Windows Vista (SP 1), Windows 7, 8, 8.1 and 10.

Minimum Requirement

CPU: 450 MHZ

RAM: 512 MB

HDD: 100 MB

Experience a brighter tomorrow …………………….Today

complete security software helps you to manage, maintain, and optimize

your computer system. SysBoost consist of six features which are Select and Wipe, Select Extensions,

Defrag Drive, Internet Wipe, Registry Clean and Registry Restore. It improves the boot up

registries, junk files and internet history. Backup of unwanted files can be taken .By

can be restored .SysBoost analyses the system and brings out all the

Select the files/folders you want to delete .Selected Files get deleted

permanently. Backup and Wipe takes the backup of selected file,

with this backup we can recover our deleted file.

Delete file with the mentioned extensions (

permanently. Backup and Wipe takes the backup of mentioned

extensions, with this backup we can recover our deleted file.

In this feature Defragmentation of drive takes

the throughput of the system. Analyses the Drive and gives

information weather the drive needs to be defragmented or not.

Clears all the temporary internet files internet Cookies

history permanently.

Scans the system and gives the accurate information of all the

unwanted registries. Software locations, shared DLLs

control, help files, startup items, deleted applications, most recently

run list are the available categories of registries.

Deletes unwanted registries can restore by using this option.

Supported Operating Systems

Windows XP (SP 2), Windows Vista (SP 1), Windows 7, 8, 8.1 and 10.

Experience a brighter tomorrow …………………….Today

complete security software helps you to manage, maintain, and optimize

your computer system. SysBoost consist of six features which are Select and Wipe, Select Extensions,

boot up time of the

of unwanted files can be taken .By

can be restored .SysBoost analyses the system and brings out all the unwanted

Select the files/folders you want to delete .Selected Files get deleted

permanently. Backup and Wipe takes the backup of selected file,

extensions (txt, bmp, pdf etc)

and Wipe takes the backup of mentioned

extensions, with this backup we can recover our deleted file.

In this feature Defragmentation of drive takes place. Increases

the throughput of the system. Analyses the Drive and gives

information weather the drive needs to be defragmented or not.

internet Cookies and internet

the accurate information of all the

DLLs, custom

applications, most recently

by using this option.

Experience a brighter tomorrow …………………….Today