Norton 2012 contain function Insight 3.0, last version of exclusive estimating technology Norton which changes the approach of users to installation new ON. Insight checks everyone downloaded files on safety before allowing it to start, this year the given technology has learned to give also to users the additional information about possible problems with stability at ON before its installation. Users can rely on this additional information to solve, whether it is necessary to install the given application or it is better to look for another, but same safe, but stabler. Beta versions also include updated behavioural protection SONAR 4.0 which monitor the started applications on suspicious behavior, quickly to find out and disconnect earlier unknown threats.
Technology Identity Safe 2012 supports your data in safe cloud Norton. You also can adjust this function and use it on several computers. The online profile is created, using your current account Norton
The basic technologies
* the Antivirus
* Protection from Spyware (programs-spies)
* the Bilaterial fireproof wall
* Protection against detection
* the Expanded protection from fishing
* network Control
* Rootkit Detection
* browser Protection
* Protection against Net worms
* Prevention of intrusions
* Protection of an operating system and appendices
* the Establishment of authenticity of a website
* Frequent automatic updatings
* Behavioural protection SONAR
* Protection against spam
* Prevention of leak of the confidential information and means of parental control
* information transfer Blocking
Key features and characteristics Norton Internet Security:
* Protection against programs-spies: finds and deletes programs-spies
* More high efficiency allows to spend less time for start and surveys.
* the technology Protected by patents finds out rootkits, hidden in operating system bowels
* Updatings of protection frames and new components of a product are given during service term
* Function On-going Protection automatically a subscription
* Automatically deletes viruses and net worms
* Anti-virus protection: provides protection against viruses of e-mail and exchange systems with instant messages (ICQ, QIP, Jabber, Google Talk, etc.).
* Protects from hackers
* Reception of the help from experts one click of the mouse. A novelty
* the Monitor of safety of a network allows to raise level of safety of a wireless network.
* Norton Identity Safe prevents theft of the identification data.
* It is carried out in a background mode.
* doesn't suppose distribution of the electronic letters infected with viruses
* Blocks attempts of theft of the identification data fishers
* Safe work with e-mail, instant messages and web sites
* Norton Reputation Service: instantly checks a source and age of a file that allows to find out and block much faster new roguish programs, than with the help ON protection of other manufacturers.
* Norton Protection System is a system of multilevel protection against viruses, programs-spies and other Internet attacks.
* Norton Download Insight warns that the loaded file or the appendix contains a harmful code before it will be started or established on the computer.
* Norton File Insight gives the detailed information on files in system, including about a source (URL a web site) and level of reliability of a file.
* Norton Pulse Updates it is carried out in a background mode and loads pulse updatings each 5-15 minutes - more often, than other competing products - for timely protection against network threats.
* Heuristic protection SONAR 4 traces suspicious behavior of programs on the computer for the purpose of fast detection of new network threats.
* Monitoring of e-mail and instant messages checks electronic letters and instant messages on presence of suspicious references and dangerous investments.
* the Clever bilateral fireproof wall blocks attempts of malefactors to get access to your computer and to steal personal data.
* Cards and network monitoring show all devices connected to a house wireless network, helping to reveal attempts of unapproved connection and-or interception of the identification data in an operating time on the Internet.