eScan Internet Security Suite Cyber Vaccine Edition Subscription (Download)
Eligibility: Everyone Qualifies. No Academic ID Required!
eScan Internet Security delivers complete protection for your devices. It is packed with the largest threat-detection network, virus protection, and home network security that won’t slow down your PC. New cloud protection technology detects threats as they emerge in real-time, Dynamic Proactive Behavioral Analysis Engine protects you even when offline, and our custom-built secure browser delivers top security and tough protection when shopping and making payments online. There is sophisticated layered real-time protection that monitors the computer against malware, keeping your application and data safe.
Its powerful scan engine provides security against known and unknown malware, phishing, and virus attacks in real-time. eScan ISS is equipped with futuristic technologies like Proactive Behavioral Analysis Engine (PBAE), Non-Intrusive Learning Pattern (NILP), MicroWorld Winsock Layer (MWL) and many more. Smart parental control protects your kids from online threats and unwanted content.
Features include:
Real-time Protection
eScan provides a sophisticated layer of real-time protection to prevent any possible spread of malicious programs. It constantly monitors the system for malware, spyware, ransomware, and various other threats. It detects and restricts malicious threats from accessing the system and exploit personal data. eScan's real-time protection has the potential to keep cyber threats away by continuously monitoring online activities.
Optimized Performance
eScan is equipped with advanced security technologies to reduce the memory and hard drive being used which eventually minimizes the CPU overhead. This, in turn, enhances the speed and performance of the computer making the regular tasks quick and safe. Moreover, using cache technology the scan time is minimized without causing any lag to the system.
Powerful Anti-Ransomware
eScan's effective Anti-Ransomware feature using Proactive Behavior Analysis Engine (PBAE) monitors the activity of all the processes. The Intelligent Shadow Backup mechanism is triggered during any eventualities, this helps users to protect their crucial data and overcome the aftershock of ransomware attacks.p> Two-Factor Authentication
eScan provides an extra layer of protection to the log-in process that authenticates and prevents any criminals from accessing the computer and personal data. This offers an additional step of security as cyberthieves require more than a username and password for authentication.
Smart Parental Control
eScan has designed Smart Parental Control to protect children and teenagers from the latest cyberthreats. While accessing the websites or applications, defined users' can be restricted based on different types of profiles. Different users have different profiles and access/web control rights.
Windows Essential Updates
eScan checks for missing security patches on the system OS by matching the installed patches with the released patch list in the database. After comparing both the patches, it installs the missing Windows critical security patches. This helps to keep the system to stay away from the latest threats and maintain the security of the home network.
Two-Way Firewall
eScan Two-way Firewall filters all the incoming and outgoing network requests, which enables you to monitor every inbound and outbound connection that is being established. This locks out hackers from connecting to the system and defends the connection of undesired apps to the internet.
Effective Endpoint Security
eScan provides protection from the known and unknown threats that can spread through USB or Firewire-based portable storage devices, such as Flash drive, Webcam, SD Card, and more. It offers an advanced Application Control that allows you to block/permit applications and prevent critical threats.
Quicker On-Demand Scan
eScan's advanced On-Demand Scanner has built-in Whitelisting and Cache technology that make scanning of files, memory, folder, and all other storage devices, more efficient and quick. Being lightweight, it minimizes the consumption of CPU and memory resources during the scanning process.
Advanced Anti-Phishing
eScan uses a phishing detection technique that detects phishing links, emails, and attachment-based on malicious behavior and blocks automatically every time when they try to reach the email boxes.
Other Highlights:
- Advanced AntiSpam: Designed to filter out unwanted and malicious emails, preventing them from reaching your inbox. It works by scanning incoming and outgoing emails for spam, viruses, Trojans, and other malicious content. It also has features to handle phishing attempts and emails with potentially harmful content.
- Terminal Service Protection Module (TSPM): A security feature designed to protect terminal servers, particularly from brute-force attacks on Remote Desktop Protocol (RDP). It works by detecting suspicious login attempts, identifying potentially malicious IP addresses, and blocking them to prevent unauthorized access. Additionally, TSPM can also detect and prevent attempts to uninstall security software, alerting administrators to these actions.
- Rugged Cloud Protection: A combination of cloud-based security features designed to provide robust and layered protection against various cyber threats. This includes real-time threat detection, advanced heuristics, and cloud-based scanning, all working together to safeguard users from malware, ransomware, and other online dangers.
- Mobile Scan: Includes real-time scanning, call and SMS filtering, and web protection. Additionally, the app offers features like contact backup, app locking, and anti-theft measures.
- USB Vaccination: Generally refers to using software to disable the Autorun feature on USB drives to prevent malware from automatically executing when the drive is inserted into a computer. This practice helps protect against the spread of malware that can exploit the Autorun functionality to infect systems.
- Secure Delete: Ensures files and folders are permanently removed from your system, preventing any possibility of recovery by data recovery software. It works by overwriting the data with meaningless data, making it unrecoverable. This is a crucial step when disposing of a computer or sharing sensitive data.
- Virtual Keyboard: A software-based interface that allows users to input text or commands on a device without the need for a physical keyboard. It typically appears as an image of a keyboard on a touchscreen or display, and users interact with it by tapping or clicking on the virtual keys.
- Windows Security Updates
- Gaming Mode
- Mobile Scan
System Requirements:
- Windows® 11 / 10 / 8.1 / 8 / 7 / Vista® / XP Service Pack 2 or higher / 2000 Professional Service pack 4 (All 32-bit & 64-bit Editions)
- CPU: 1 GHz recommended Intel or AMD single core x86 or x64
- Disk Space: 1 GB minimum
- Memory: 1 GB recommended