Talking Tom Cat. Clash of Clans. Subway Surfers. TubeMate 3. Google Play. Biden to send military medical teams to help hospitals. N95, KN95, KF94 masks. GameStop PS5 in-store restock. Baby Shark reaches 10 billion YouTube views. Microsoft is done with Xbox One. Windows Windows.
Most Popular. New Releases. Desktop Enhancements. Networking Software. Trending from CNET. Download Now. Designed for personal, student and home office use, Blink Personal Edition is the only solution that provides consumers with complete PC security.
Blink Personal Edition is an internet security solution that protects users' systems and sensitive data from viruses, spyware, identity theft, malicious web sites, and other attacks that target system flaws and vulnerable system settings.
Users can rest easy knowing that their system and sensitive data are secured by Blink's unique combination of proven protection technologies, including: AntiVirus Module. Blink actively protects you using On-Access file scanning, stopping threats before they have a chance to embed themselves in your system.
Additionally, Blink scans your computer files looking for viruses, Trojans, worms, keyloggers, backdoors, and spyware that could be putting your system and personal data at risk without your knowledge. Using proactive technology, Blink can intelligently protect you from online threats and malicious exploits targeting third-party software vulnerabilities, even if no known vendor patches exist. System Protection Module. This module actively monitors key system components and recognizes malicious activity before it has time to compromise your system.
Personal Firewall Module. Create custom rules and exceptions to only allow the traffic you specify while keeping malicious traffic at bay. Vulnerability Assessment Module. Inline mitigation instructions for discovered vulnerabilities ensure users can apply the proper fixes to protect themselves.
Full Specifications. What's new in version 4. Through its innovative approach to protocol analysis, Blink is able to detect and block zero-day attacks that bypass standard signature-checking solutions.
All of this is based on protocol analysis and is backed up by traditional pattern matching. As an example, Blink users were inherently protected from all five of the April Microsoft "critical" updates long before the vulnerabilities were ever discovered.
As a matter of fact, since Blink was introduced, it has inherently protected against every Microsoft critical vulnerability that has been announced.
EEye is savvy enough not to promise that all future vulnerabilities will be inherently protected as well, but Blink technology does provide a significant advantage and nimbleness over previous methods of antivirus protection. So, what exactly makes Blink so different? It uses innovative protocol analysis and heuristics at the network-driver and file-system levels to determine if a particular request is malicious or not. It then uses pattern matching to determine the name of the attack that it just blocked.
This is a game-changer. Blink has a very small footprint at only 66 Mbytes of RAM with all services fully configured, which is less than half of comparable hodgepodge pattern-matching solutions. It also uses "sandboxing" to test-run applications in protected memory to see if they attempt any malicious behavior before allowing them to run in the core operating system. Sandboxing creates a protected, limited area in computer memory where applications are allowed to execute without risking damage to the system that hosts them.
REM is not only the centralized console for the popular Retina Network Security Scanner, it also allows for centralized Blink policy management and reporting. Blink can be configured to run on the desktop in hidden mode so that the user does not even know it is running, one of four modes that allow varying degrees of end-user visibility.
The data is stored in a SQL database, which means reporting is very flexible. It allows for several different views, most importantly the ability to view the data from a whole asset perspective rather than just by each scan.
0コメント