MicroWorld Winsock Layer (MWL) Technology
The MicroWorld Winsock Layer technology is a revolutionary technology that resides on the Winsock Layer of the operating system and scans all the incoming and outgoing traffic from the Internet and checks for any security violating content. If the data packet is clean it is passed or else it is removed before it reaches the application layer.
Host Intrusion Prevention System (HIPS)
The Host Intrusion Prevention System (HIPS) monitors all the network activities on the system. This technology helps in detecting when a rootkit, keylogger, spyware or Trojan is installed on the system. HIPS technology not only warns the user about any intrusion, but, also blocks it.
HIPS technology uses both signature based detection as well as advanced heuristics antivirus algorithm. You can also set policies specifying the behavior of operating systems or applications. The attacks that HIPS protect against include viruses, spam, spyware, worms, Trojans, keyloggers, bots, rootkits, and Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks.
Domain & IP Reputation Check
The Domain & IP Reputation Check technology verifies the credibility of Web domains by tracking any indication of suspicious activities on the web page. This technology also verifies the integrity of the IP address by comparing it with a list of known email senders and by using a dynamic service that assesses email senders reputation in real-time. Emails received from domains with malicious activities are not accepted.
Non Intrusive Learning Pattern (NILP) Technology
NILP works on the basis of Artificial Intelligence where in, it learns user’s behavior and then takes an informed decision in the background and help identify and classify mails on behalf of the users whether the mails are spam or ham.
Sem MicroWorld WinSock Layer (MWL)
Todos os emails que entram ou saem, passam através do WinSock Layer ao nível do servidor e ao nível do cliente.
Com MicroWorld WinSock Layer (MWL)
MWL situase no WinSock. Todo o conteúdo passando pelo WinSock tem como mandatório passar pelor MWL onde é conferido contra qualquer violação de segurança dos dados. Se os dados forem alterados, ele é afastado e o dados limpos são passados para a aplicação.
MicroWorld launches a revolutionary concept to tackle the Content Security threats
The overall business scenario is undergoing a rapid change with Information Technology providing more advanced and rapid means of business communication like Internet and e-mails. However, as far as information that is being made available across the computer systems is concerned, there is a race to restrict its access, guard against information abuse and protect the valuable content.
Virus-pranksters are now using the Internet as a frictionless distribution channel for dangerous viruses and worms. Over the years, contemporary virus threats have transformed into content security threats. These comprise e-mail and web-based virus downloads, MS Word based macro bombs, offensive e-mail and web content, misuse / abuse of e-mail resources, junk mail and Spam infections, harmful Java or ActiveX applets, intrusion of anonymous Internet users and trespassing of unauthorized bodies into the company’s internal network.
|These threats not only damage files and computers by acting as viral agents, but also impose productivity losses, wasting disk space, time and financial resources. Ironically, even as certain methods to guard Content Security have evolved, threats to security have become more severe, even causing destruction of data. However, the systems employed to detect these threats are still handicapped by several deficiencies. The “cure” that is provided by other products only scans data after it is saved on the hard disk; by which time the damage is already done.|
MicroWorld, the leader in Content Security and Communications software, has now launched “MicroWorld-WinSock Layer” (MWL), a revolutionary concept in scanning Internet traffic on a real-time basis. This new concept is set to change the manner in which Content Security threats are tackled in the knowledge world.
Click on the image for bigger view
MWL is revolutionary because unlike the other products and technologies, currently available, MWL tackles a threat before it reaches your applications. Other products deal with the threat after the applications have already processed it.
Technically, MWL is placed above the WinSock layer and acts as a “Transparent Gatekeeper” on the WinSock layer of the operating system. All data packets coming on different TCP/IP ports are assembled. It then decodes e-mail and web traffic, FTP and ICQ traffic along with all the attachments and passes them through numerous filters such as Virus Filters, Content Filters, Attachment Filters, etc. These filters check validity of the file’s content and issue dynamic notifications.
MWL technology oversees all data flowing to-and-from the Internet, thereby allowing it to process it without interfering with the applications. Dynamic compression and decompression facilities of data flow, between the Internet and your computer in order to maximize effective bandwidth usage are thus provided by MWL.