user manual
Your Ultimate Protection. The final frontier for any possible threat to your computer
system. As virus detection based on code analysis has not always offered good results, BitDe-
fender has implemented behavior based protection, providing security against newborn malware.
These are the costs that organizations want to avoid and what the security products are designed
to prevent:
• Worm attacks
• Communication loss because of infected e-mails
• E-mail breakdown
• Cleaning and recovering systems
• Lost productivity experienced by end users because systems are not available
• Hacking and unauthorized access that causes damage
Some simultaneously developments and benefits can be accomplished by using the BitDe-
fender security suite:
• Increase network availability by stopping the spread of malicious code attacks (i.e., Nimda,
Trojan horses, DDoS).
• Protect remote users from attacks.
• Reduce administrative costs and deploys rapidly with BitDefender Enterprise management
capabilities.
• Stop the spreading of malware through e-mail, using a BitDefender e-mail protection at the
company's gateway.Temporarily or permanently block unauthorized, vulnerable, and expens-
ive application connections.
2.2. Data Security Division
Ever since the beginning, SOFTWIN's Data Security Division approached data protection in
a specific manner, with the first intelligent update, requiring no user intervention, the first remote
antivirus management through WAP technology or the first Personal Firewall to be integrated
within an antivirus engine to provide complete response to today's complex security threats.
Born to provide full data security at all critical levels in today's business environment, Data
Security Division aims to ensure systems protection against computer viruses, to do antivirus
research, to develop new technologies for monitoring all possible ways to infect a system and,
last but not least, to educate the IT&C public on the danger of computer viruses.
BitDefender security solutions satisfy the protection requirements of today's business environ-
ment, enabling management of all complex threats that endanger a network, from a small local
area to large multi-server, multi-platform WAN's.
28
Overview
Description and
features
02










