signatures, heuristics, continuous process monitoring and a global threat intelligence network.
The fully-featured two way personal firewall with Intrusion Detection is essential in blocking intrusion and hijack attempts.
Potentially harmful websites are marked in the search results and known malicious pages are blocked.
Prevent the loss of confidential data by setting filters that will block the transmission of sensitive information.
Restrict or block employee access to applications or web pages.
You can choose to allow or deny users the ability to modify security settings for their system.
The quarantine is stored locally but can be managed centrally from the control console.
Assign security policies to companies or groups of computers.
The solution is available in English, German, Spanish, French, and Romanian.
With the Bitdefender-hosted management console you can control and monitor remote users in real time.
Security policies that adapt as users take their systems outside the company.
Different security policies can be adapted based on employee roles in the company, they are available when there is an Active Directory integration and are applied when the user logs in.
After you install Bitdefender on one computer, unprotected systems are automatically detected and you can remotely deploy protection to all of them.
Internal accounts with different access privileges can be created in the management console.
Using a pre-configured virtual appliance installation means the console can be up in 30 minutes, not hours or days as with other solutions.
With Bitdefender hosting the management infrastructure, the web console is available right after signup.
Minimize risks of infections and data loss with automatic USB scanning and device control.
During installation, Bitdefender detects competitive solutions and starts the uninstall process.
Product and signature updates can be distributed more efficiently inside the network through a system that works as a relay.
Actions performed in the management console can be tracked in the audit logs.
Set up email notifications to be triggered automatically when certain events occur.
Centrally monitor the security posture of the organization using on-demand or scheduled reports.
Enables the administrator to save time when creating new policies by using ones that are already created.