Up to twelve licenses? Buy TrustPort Total Protection.

Larger number of computers? Order TrustPort Security Elements.

A centrally managed solution for company computers against cyber crime and the misuse of private data. All incoming data is verified at entry point level, and all malicious software is blocked. Sensitive data is protected by online or offline encryption and this data can also be irrevocably shredded. The software can be deployed and configured in the network remotely thanks to central management’s web interface.

Keeping company data secure

  • Antivirus and antispyware
  • Mail and web protection
  • Encryption of private data
  • Shredding of unused data
  • Creation of a rescue boot disk
  • Central management of software






Protection of local files

Top antivirus scanning engines monitor. Whenever it detects suspicious or malicious code, prevent the startup file and the spread of viral infection. At regular intervals, is a preventive automatic control your entire computer or selected targets.

Personal firewall

Internet connections are used not only by legitimate applications, but also by hackers and malware. The firewall automatically recognizes the majority of all legitimate applications, however suspect or unknown connections are stopped unless the user explicitly decides to allow them.

Internet protection

Antivirus scanning also applies to all emails and websites which are usually the most common sources of virus infections. Downright dangerous or undesirable websites can also be blocked by web filtering. Undesirable junk email is liquidated by the antispam which is also part of the application.

Protection for portable media 

After connecting the portable memory media the antivirus automatically starts its scanning. One can also create a free antivirus on these media, which protects the drive and the data stored on it no matter to which computer the user is currently connected.

Recovery boot disk

There are times when users experience a viral infection which completely impedes the computer's operating system. For these types of cases, the application allows users to prepare in advance a system rescue disk, which can clean the system and restore its normal operating function.

Encryption and shredding

Sensitive company data stored on end stations can be protected in two ways. The data can either be stored in encrypted archives which are very useful for backups, or the data can be stored in an encrypted drive, making it ideal for everyday work. The application also offers reliable data shredding.

Recommended requirements of the endpoint software

  • Intel® Pentium IV processor or compatible
  • 512 MB RAM
  • 500 MB free disc space

Recommended requirements of the central management

  • Intel® Pentium IV processor or compatible
  • 1 GB RAM
  • 1 GB free disc space

Operating systems supported


Operating system TrustPort Total Protection Business
Microsoft® Windows® 7
Microsoft® Windows® 8 (x86 and x64)
Microsoft® Windows® Vista
Microsoft® Windows® XP

Language versions of the endpoint software

Language TrustPort Total Protection Business


Language versions of the central management

Language TrustPort Management


TP2015-1.png TP2015-2.png TP2015-3.png TP2015-4.png
TP2015-5.png TP2015-6.png TP2015-7.png TP2015-8.png
TP2015-9.png TP2015-10.png TP2015-11.png TP2015-12.png
TP2015-13.png TP2015-14.png TP2015-15.png TP2015-16.png

Installation file

TrustPort Total Protection Business – 30-day fully functional trial version

TrustPort Management Server – central administration, server module

TrustPort Management Client – central administration, client module



Licence agreement



User guide

Recovery boot disk manual


If you need more information about this product, please visit the support section. Information can be found either in the database of frequently asked questions, or you can send your query using the form provided.


Which product should you choose for your workstations?

When selecting the right solution for your workstations, fulfilling requirements for the safety of your data and communications, the following table will assist you.

Basic computer protection TrustPort Antivirus Business TrustPort Internet Security Business TrustPort Total Protection Busines
Resident antivirus protection
Antivirus check on demand
Internet protection TrustPort Antivirus Business TrustPort Internet Security Business TrustPort Total Protection Busines
Personal firewall
Mail antivirus protection
Spam disposal
Web antivirus protection
Family protection
Creation of transferable antivirus
Mobile solution Portunes
Mobile solution Skytale
Extended data protection TrustPort Antivirus Business TrustPort Internet Security Business TrustPort Total Protection Busines
Virtual encrypted disks
Creation of encrypted archives
Secure shredding
Back up system disk
Central management TrustPort Antivirus Business TrustPort Internet Security Business TrustPort Total Protection Busines
Remote installation
Mass updates
Remote configuration