Welcome to the Learning Center
Welcome
Welcome to ZoneAlarm security software suite of products.
ZoneAlarm protects your PC, your
browser, and your personal data.
This guide includes the set of features that exists in the premium product - ZoneAlarm Extreme Security
.
The product you
installed may not have all the features included. For the complete set of features, consider
upgrading.
Features Timeline
-
Anti-Phishing Chrome Extension
introduced in ZoneAlarm
Protects your privacy from online phishing attacks.
-
Scans files, memory, and boot sectors, and blocks viruses, spyware, riskware, Trojan horses, worms, bots, and rootkits. Antivirus consists of these components:
- Riskware scan detects potentially harmful software.
- Network File Scan scans shared files located on your local network.
- Email Monitoring scans outgoing and incoming emails and attachments for known malware.
- Real Time Cloud Protection checks Check Point cloud database for the latest information on software, files, and web resources.
- Web Monitor scans web site before they are accessed and web content. before it is downloaded.
- Mailbox Files Scanning scans mailbox files (such as Outlook .pst/.ost) during system wide scans.
- Behavioral scanning detects malware based on how the files behave on your PC.
-
Offers quick and full scans for better protection.
-
Files that have been quarantine are rescanned against updated malware definitions, after a period of time.
-
Checks email attachments and files downloaded from the web for Zero-Day threats, using virtual environment on the cloud servers.
-
Prevents unauthorized programs from illegally accessing your network, acting as a server, or making changes to your OS settings.
-
Detects applications that behave suspiciously and fine-tunes application behavioral settings.
-
Lets you fine tune application control down to individual application components.
-
detects and blocks programs and processes that try to change the OS settings or web browser settings.
-
Protects your PC from hackers and stops spyware from sending your data out to the Internet.
-
Monitors programs for suspicious behavior and stops new attacks that bypass traditional anti-virus protection.
-
Monitors your credit and alerts you of changes in your credit files and possible identity theft.
-
Prevents recording of keystrokes from your computer.
All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice.
RESTRICTED RIGHTS LEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19.
TRADEMARKS:
Refer to the Copyright page http://www.checkpoint.com/copyright.html for a list of our trademarks.
Refer to the Third Party copyright notices http://www.checkpoint.com/3rd_party_copyright.html for a list of relevant copyrights and third-party licenses.