Top Banner
34
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Qh 2010 Presentation
Page 2: Qh 2010 Presentation

Agenda

• Flavors of Quick Heal 2010• Features• Enhancements• New Accreditations• New Policies

Page 3: Qh 2010 Presentation

Quick Heal 2010

• A Revamped and Extended portfolio of products for the consumer AV market.

AntiVirusInternet Security Total Security

Page 4: Qh 2010 Presentation

Internet Security 2010• A hi-end product to provide all-round security

for every security need at no extra cost for all at no extra cost for all existing AV usersexisting AV users

Page 5: Qh 2010 Presentation

Internet Security 2010 Features

AntiVirusAntiSpywareAntiRootkitTrack CleanerAntiMalware

Page 6: Qh 2010 Presentation

Internet Security 2010 Features

Firewall AntiSpam AntiPhishing

Page 7: Qh 2010 Presentation

• Self Protection• Autorun Protection• Browsing Protection• Packer Filter• Entertainment Mode

Internet Security 2010 New Features

Page 8: Qh 2010 Presentation

• Protects Quick Heal files, folders and registry entries and keeps itself protected from being tampered or getting infected.

Self Protection

Page 9: Qh 2010 Presentation

• Prevents execution of autorun malwares from infected pen drive on your PC.

• Vaccinates pen drive to prevent from autorun malware infections.

Autorun Protection

Page 10: Qh 2010 Presentation

• Prevents browser from visiting infected websites.

Browsing Protection

Page 11: Qh 2010 Presentation

• What is a Packer?

• Why malwares use packers?

• How can Packer Filtering be used for new and unknown threats?

Packer Filter

Page 12: Qh 2010 Presentation

• Configures silent mode and lets you play games, watch movies or give presentations in an uninterrupted way.

Entertainment mode

Page 13: Qh 2010 Presentation

Total Security 2010

• Product for the demanding users, who desire to have total control over their PC security.

Page 14: Qh 2010 Presentation

Total Security 2010 Features

• All the features of Internet Security 2010

PC2Mobile scan Data Theft Protection

Page 15: Qh 2010 Presentation

• Tuning Features– Registry cleanup– Disk cleanup

• Secure Delete

Total Security 2010 Features

Page 16: Qh 2010 Presentation

Tuning Features

• Registry Cleanup – Removes and repairs invalid registry entries

• Disk Cleanup – Removes all the unwanted junk files and temporary files including temporary Internet files

Page 17: Qh 2010 Presentation

Tuning Features

• Registry Cleanup – Removes and repairs invalid registry entries

• Disk Cleanup – Removes all the unwanted junk files and temporary files including temporary Internet files

Page 18: Qh 2010 Presentation

PCTuner 2.0

Page 19: Qh 2010 Presentation

• Securely deletes files/folders permanently and ensures non recovery of sensitive data.

Secure Delete

Page 20: Qh 2010 Presentation

AntiVirus 2010 Server Edition• Robust protection for crucial server platforms.

Page 21: Qh 2010 Presentation

Server Edition Features

AntiVirusAntiSpywareAntiRootkitTrack CleanerAntiMalwareAntiSpamData Theft Protection

Page 22: Qh 2010 Presentation

• For the cost conscious customers, who desire assurance of Quick Heal protection..

Quick Heal AntiVirus 2010

Page 23: Qh 2010 Presentation

Enhancements in Quick Heal 2010

• Compatible with latest Microsoft Windows 7 and all 64 bit editions of Microsoft Windows Operating System.

• Server edition is now compatible with Microsoft Windows Server 2008 R2 Edition.

• Server edition now supports terminal server environment.

Page 24: Qh 2010 Presentation

Enhancements in Quick Heal 2010

• Send suspicious files to Quick Heal Research and Development center even if you don’t have mail client configured.

Page 25: Qh 2010 Presentation

New accreditations

Page 26: Qh 2010 Presentation

Lighter | Faster | Smarter

• Smaller memory footprint. 60% lesser resource consumption than Quick Heal 2009

• Update size 1/5th of 2009• Memory Scanner is now able to detect Rootkit

capable malwares running in system memory

Page 27: Qh 2010 Presentation

Policy changes

• Separate product for server Operating System– Hence desktop products like Internet Security,

Total Security will no longer support Server Operating System.

• Multiuser Pack registration.

Page 28: Qh 2010 Presentation

Multiuser Pack Registration

• Product Keys from 5 User Pack

2Z484-829F0-XXXXX-B1D078S110-FN012-XXXXX-99594E8F9A-1B165-XXXXX-08FFFFK94B-FS8FB-XXXXX-891A9FJF07-7AF99-XXXXX-7928A

Page 29: Qh 2010 Presentation

• Registering - 2Z484-829F0-XXXXX-B1D07

Multiuser Pack Registration

Page 30: Qh 2010 Presentation

• Registering - 2Z484-829F0-XXXXX-B1D07

Multiuser Pack Registration

Page 31: Qh 2010 Presentation

• Registering - 2Z484-829F0-XXXXX-B1D07

Multiuser Pack Registration

Page 32: Qh 2010 Presentation

• Registering - 2Z484-829F0-XXXXX-B1D07

Multiuser Pack Registration

Page 33: Qh 2010 Presentation

• Product Keys from 5 User Pack

2Z484-829F0-XXXXX-B1D078S110-FN012-XXXXX-99594E8F9A-1B165-XXXXX-08FFFFK94B-FS8FB-XXXXX-891A9FJF07-7AF99-XXXXX-7928A

Multiuser Pack Registration

Page 34: Qh 2010 Presentation

Thank You.