Welcome to ZoneAlarm 2018 security software suite of products.
ZoneAlarm 2018 protects your PC, your browser, and your personal data.
This guide includes the set of features that exists in the premium product - ZoneAlarm Extreme Security 2018.
The product you installed may not have all the features included. For the complete set of features, consider upgrading.
introduced in ZoneAlarm 2018
Protects your privacy from online phishing attacks.
Scans files, memory, and boot sectors, and blocks viruses, spyware, riskware, Trojan horses, worms, bots, and rootkits. Antivirus consists of these components:
Offers quick and full scans for better protection.
Files that have been quarantine are rescanned against updated malware definitions, after a period of time.
Checks email attachments and files downloaded from the web for Zero-Day threats, using virtual environment on the cloud servers.
Prevents unauthorized programs from illegally accessing your network, acting as a server, or making changes to your OS settings.
Detects applications that behave suspiciously and fine-tunes application behavioral settings.
Lets you fine tune application control down to individual application components.
detects and blocks programs and processes that try to change the OS settings or web browser settings.
Protects your PC from hackers and stops spyware from sending your data out to the Internet.
Monitors programs for suspicious behavior and stops new attacks that bypass traditional anti-virus protection.
Monitors your credit and alerts you of changes in your credit files and possible identity theft.
Prevents recording of keystrokes from your computer.
Quickly locate your lost or stolen laptop, remotely lock it, and recover the data.
Lets you back up and restore your data in case of a hardware failure.
All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice.
Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19.
Refer to the Copyright page http://www.checkpoint.com/copyright.html for a list of our trademarks.
Refer to the Third Party copyright notices http://www.checkpoint.com/3rd_party_copyright.html for a list of relevant copyrights and third-party licenses.