A complete security solution to protect computers in a company network against malware and Internet threats. The software is installed remotely on individual work stations by means of central administration. It is an effective and economical solution, enabling simple installation and updating of the security software on all protected computers.

Perfect security for computers in a network

  • On access protection
  • On-demand scanning
  • Automatic monitoring of media
  • Mail and web protection
  • Remote installation
  • Remote maintenance

Characteristics

Platforms

Documents

Comparison

Antivirus and antispyware

Resident protection runs continuously as a background application of the operation system, which is able to detect immediately all viruses, worms, trojans and spyware hidden in the opened files. The software checks the hard drive at regular intervals, depending on particular settings. The software undergoes automatic updates and is thus always ready for new threats.

Internet protection

The computers are also directly protected against any threats coming from the Internet. The software scans web sites, eliminates spam and scans electronic mail. It is fully integrated into common mail clients. The parental lock guard enables the blocking of certain categories of web sites and thus eliminates undesirable surfing.

Personal firewall

Only legitimate internet connections are enabled on all the protected computers. Unknown or suspicious communication is immediately stopped and reported to the user, who can decide, whether to enable or block this connection, and whether the same procedure should be applied as a rule.

Protection of memory media

Once any new source is connected to the computer, the software automatically starts scanning it or offers its scanning. This significantly decreases the risk of a viral infection for example from a flash drive. Besides that, it is possible to protect directly a particular memory medium by installing a portable version of antivirus.

Self-defence of software against attacks

Any possible attempt by malware to disable the antivirus software is doomed to fail. This is because the system files of the antivirus are protected against unauthorized changes. Malware cannot avoid being detected in this way.

Central management

Installation, setting and updating of the security software on end station computers is done by means of an elaborate web site interface. Central administration is accessible from any location, which significantly simplifies the work of network administrators.

Recommended requirements of the endpoint computer

  • Intel® Pentium IV processor or compatible
  • 512 MB RAM
  • 500 MB free disc space

Recommended requirements of the administration server

  • Intel® Pentium IV processor or compatible
  • 1 GB RAM
  • 1 GB free disc space

Operating systems supported

 

Operating system TrustPort Security Elements Basic
Microsoft® Windows® 7
Microsoft® Windows® 2008
Microsoft® Windows® Vista
Microsoft® Windows® XP

Language versions of the endpoint software

Language TrustPort Security Elements Basic
Czech
Danish
Dutch
English
French
German
Hungarian
Italian
Polish
Portuguese
Russian
Spanish

 

Language versions of central administration

Language TrustPort Security Elements Basic
English
Czech
 

Installation files

TrustPort Internet Security – 30-day fully functional trial version

TrustPort Management Server – central administration server module

TrustPort Management Client – central administration client module

 

Documents

License agreement

 

Manuals

TrustPort Internet Security manual

Recovery boot disk manual

 

If you need more information about this product, please visit the support section. Information can be found either in the database of frequently asked questions, or you can send your query using the form provided.

Support

Which solution to choose?

When choosing a suitable company solution, covering security of your network, the following table will assist you. It shows the particular levels of the TrustPort Security Elements bundle, and the applications, used on those levels.

Features TrustPort Security Elements Basic TrustPort Security Elements Advanced TrustPort Security Elements Premium TrustPort Security Elements Ultimate
Central administration TrustPort Management TrustPort Management TrustPort Management TrustPort Management
Endpoint protection TrustPort Internet Security TrustPort Internet Security TrustPort Internet Security TrustPort Total Protection
Protection of file servers TrustPort Antivirus for Servers TrustPort Antivirus for Servers TrustPort Antivirus for Servers
Network antivirus protection TrustPort Net Gateway TrustPort Net Gateway
Network antispam protection TrustPort Net Gateway TrustPort Net Gateway
Website filtering at the entry point TrustPort Net Gateway
Data protection using encryption TrustPort Total Protection