TrustPort Total Protection Business
Up to twelve licenses? Buy TrustPort Total Protection.
Larger number of computers? Order TrustPort Security Elements.
A centrally managed solution for company computers against cyber crime and the misuse of private data. All incoming data is verified at entry point level, and all malicious software is blocked. Sensitive data is protected by online or offline encryption and this data can also be irrevocably shredded. The software can be deployed and configured in the network remotely thanks to central management’s web interface.
Keeping company data secure
- Antivirus and antispyware
- Mail and web protection
- Encryption of private data
- Shredding of unused data
- Creation of a rescue boot disk
- Central management of software
Protection of local files
Top antivirus scanning engines monitor. Whenever it detects suspicious or malicious code, prevent the startup file and the spread of viral infection. At regular intervals, is a preventive automatic control your entire computer or selected targets.
Internet connections are used not only by legitimate applications, but also by hackers and malware. The firewall automatically recognizes the majority of all legitimate applications, however suspect or unknown connections are stopped unless the user explicitly decides to allow them.
Antivirus scanning also applies to all emails and websites which are usually the most common sources of virus infections. Downright dangerous or undesirable websites can also be blocked by web filtering. Undesirable junk email is liquidated by the antispam which is also part of the application.
Protection for portable media
After connecting the portable memory media the antivirus automatically starts its scanning. One can also create a free antivirus on these media, which protects the drive and the data stored on it no matter to which computer the user is currently connected.
Recovery boot disk
There are times when users experience a viral infection which completely impedes the computer's operating system. For these types of cases, the application allows users to prepare in advance a system rescue disk, which can clean the system and restore its normal operating function.
Encryption and shredding
Sensitive company data stored on end stations can be protected in two ways. The data can either be stored in encrypted archives which are very useful for backups, or the data can be stored in an encrypted drive, making it ideal for everyday work. The application also offers reliable data shredding.
Recommended requirements of the endpoint software
- Intel® Pentium IV processor or compatible
- 512 MB RAM
- 500 MB free disc space
Recommended requirements of the central management
- Intel® Pentium IV processor or compatible
- 1 GB RAM
- 1 GB free disc space
Operating systems supported
|Operating system||TrustPort Total Protection Business|
|Microsoft® Windows® 7|
|Microsoft® Windows® 8 (x86 and x64)|
|Microsoft® Windows® Vista|
|Microsoft® Windows® XP|
Language versions of the endpoint software
|Language||TrustPort Total Protection Business|
Language versions of the central management
TrustPort Total Protection Business – 30-day fully functional trial version
TrustPort Management Server – central administration, server module
TrustPort Management Client – central administration, client module
If you need more information about this product, please visit the support section. Information can be found either in the database of frequently asked questions, or you can send your query using the form provided.
Which product should you choose for your workstations?
When selecting the right solution for your workstations, fulfilling requirements for the safety of your data and communications, the following table will assist you.
|Basic computer protection||TrustPort Antivirus Business||TrustPort Internet Security Business||TrustPort Total Protection Busines|
|Resident antivirus protection|
|Antivirus check on demand|
|Internet protection||TrustPort Antivirus Business||TrustPort Internet Security Business||TrustPort Total Protection Busines|
|Mail antivirus protection|
|Web antivirus protection|
|Creation of transferable antivirus|
|Mobile solution Portunes|
|Mobile solution Skytale|
|Extended data protection||TrustPort Antivirus Business||TrustPort Internet Security Business||TrustPort Total Protection Busines|
|Virtual encrypted disks|
|Creation of encrypted archives|
|Back up system disk|
|Central management||TrustPort Antivirus Business||TrustPort Internet Security Business||TrustPort Total Protection Busines|