eEye Digital Security Offers Blink Personal for Free Download
eEye Digital Security releases Blink Personal, a free version of its Blink security technology, developed for non-commercial users. Blink Personal is the first free security product available to consumers to combine multiple layers of technology that protect against identity theft, worms, trojan horses and other attack methods hackers use, into a single agent that is unobtrusive, integrated and deeply-layered with security functionality. Deployed as a software agent on a Windows-based desktop PC or laptop, Blink Personal leverages multiple layers of protection to shield individual digital assets from attacks and keep systems up and running.
Blink Personal combines the following technologies into an integrated solution:
- Protocol-based Intrusion Prevention System stops both known and unknown attacks from ever reaching the operating system, effectively repelling hackers
- Application Protection prevents buffer overflow attacks from passing control of a system to an external agent or crashing a system in a denial of service attack
- System Firewall protects inbound and outbound port access
- Application Firewall determines which protocols can talk to specific applications
- Anti-Phishing Protection warns of fraudulent links and URLs
- Retina Local Agent for periodic assessment of all local system vulnerabilities and how to remediate them
- System Control controls which applications can execute on the system and whether removable storage devices, such as USB drives, can be used.
Blink Personal also incorporates a Neighborhood Watch program, a free service where users can choose to send anonymous attack data to eEye's Research Team without any disruption to the user, creating a wide sensor net for new attacks and zero-day events. This feature allows consumers, on an optional basis, to participate in creating the internet's largest attack sensor web. Each installation of Blink Personal blocks attacks and sends the attack data anonymously to eEye's Research Lab, where it can be analyzed to see if the attack is an existing, known attack, a variant on a known attack or a new attack, increasing the security for all other users.
write your comments about the article :: © 2006 Computing News :: home page