Together they scan your system for widely distributed malware and dig up new or localised threats. The intelligent technologies complement each other and work exactly where they are needed – without impairing the speed of your PC.
What happens after you have double-clicked a file? Are unwanted processes launched in the background? Our behaviour analysis stops unnoticed downloads, for example, before they pose a risk.
We offer protection against exploits via internally developed technology. The main thing to understand is that numerous small processes run consecutively in a program. Each process reacts to the one before, and so on.
No opportunity for extortion Trojans
Such processes are stopped immediately, so your pictures, videos, documents and emails cannot be encrypted.