graphic DefenseWall Personal Firewall - Protection
  



DefenseWall Personal Firewall integrated with DefenseWall HIPS (Host-based Intrusion Prevention system) protection scheme is 'Isolation'

Defense itself is based on a 'Sandbox' scheme.
Untrusted processes run within a virtual space - not separated from each other, but separated from the trusted space on your system, with reduced rights.  This is built upon policy-based restrictions and limited virtualization. 

Sandboxing creates a maximum level of protection.

DefenseWall Personal Firewall identifies processes and applications in two ways: Trusted (safe) or Untrusted (possible threat).  'Trusted' files are core system applications and processes that are not dangerous internet content or potentially dangerous software.

Applications and processes which interact with the internet - 'threat gateways' - pose a serious risk to your system safety.  Hackers use these threat gateways and applications to penetrate your computer, to auto-run malicious programs, set-up and run botnets without your knowledge or to infect and alter it, resulting in damage to your system integrity.

DefenseWall marks these threat gateways and processes as 'Untrusted' and they operate in an 'isolated' environment.  Any files and applications downloaded or launched through those untrusted gateways are also marked Untrusted - they cannot harm your system. 

DefenseWall prevents untrusted processes from modifying the executables, inter-process communications, multimedia, documents, phone databases (target for 'dialer' malware), hosts file, adding or modifying autostart areas (both registry and
file system), adding or modifying drivers/services (targeted by 'rootkits'), modifying
the desktop and browser settings, plugins and extensions, setting global hooks (usually used by 'key loggers'), injecting their code into Trusted Processes, taking screenshots and many other dangers.  DefenseWall  will not allow it!

In addition, all potentially dangerous files which are created by Untrusted Processes will be marked as 'Untrusted'.  Any process launched by an untrusted process will be Untrusted as well.  This Untrusted 'attribute inheritance' is required for attachments and downloaded software from within your browser or other media from the internet. Furthermore, processes will also be marked as Untrusted according to our internally maintained 'Untrusted Files' inheritance ruleset.  For more information please see Untrusted Applications.

Data Theft Protection!
Potentially dangerous actions will be blocked without a multitude of annoying pop-ups seen with other intrusion prevention programs.  There are a few, vital exceptions - DefenseWall will give you an alarm notification for Advanced Key Loggers, Disabled Protection and Resource Protection issues.  Unwanted or potentially dangerous actions are stopped 'dead in it's tracks'.  Your personal information is immediately locked down.

Lock up your data!
DefenseWall prevents Untrusted processes from accessing Secured files and folders. You can add any files or folders to prevent your sensitive data from being accessed or stolen by malware. 

Plugin Injection Protection!
If a process loads a Dynamic-Link Library(DLL)  - a file within a program which is called to execute an action - and this module is created by an Untrusted process, this process is also marked as Untrusted.  This prevents any possibility of escape from the Untrusted Process Area. 

Full System Protection!
DefenseWall does not allow untrusted processes to break your system integrity or to break out of the Virtual Untrusted Processes Area.

If malicious software has entered your system via any threat gateway application, it will not be able to install itself properly onto your system, to steal important files or break through the Untrusted process Virtual Border

If you notice that a suspicious file or process is attempting to run, you may terminate it with the handy Big Red Button (Stop Attack)

You can manually clean up any deactivated malware traces using File and Registry Rollback.  

Non-expert users should do a regular, weekly maintenance scan with automatic tools such as an anti-virus and/or anti-malware program.


graphic

Copyright  © 2004-2015   SoftSphere Technologies
All Worldwide Rights Reserved