network security, computer security, internet security
A highly detailed report is provided following a period of monitoring using state of the art hardware that actually analyzes executables on the fly in Virtual Machine technology. This provides an extremely accurate (near zero false positives) report profile for your organisation which can help you determine the extent to which you are affected by stealthy malware such as that seen in 2010 in Operation Aurora.
Print this page
Create your free Hotfrog business profile
Follow Hotfrog on:
Hotfrog Small Business Hub