Security Through Virtualization™
Traditional anti-malware products available today are based on a concept of waiting for new malware and other threats to first be developed first by hackers, who “release them into the wild”, damaging an untold number of computers and computer systems along the way. Only at that point do most conventional anti-malware developers quickly race each other to be the first to develop a new security update to fight the new malware and, only then, to deliver that update to their subscribers.
SafeActive Security Technology works differently. SafeActive doesn’t require any signature updates or security decisions ―Ever!
Computers and computer systems protected by SafeActive are automatically protected from any known and unknown malware, viruses, spyware, and Trojans, even if you just happen to be the first ever to download a new malware.
SafeActive Security Technology uses a unique application virtualization technology that transparently redirects modifications in your PC to a virtual, isolated environment, so that unauthorized modifications cannot be applied to your actual PC.
This innovative application has been developed by an Israeli software house that holds the relevant patent.
SafeActive’s application virtualization technology should not be confused with PC virtualization software such as VMware or Virtual PC. SafeActive’s application virtualization does not consume resources, memory, and CPU the way PC virtualization software does.
SafeActive application virtualization merely redirects applications’ writes to another place on the disk. Therefore, only the modifications are duplicated. Windows and its processes continue to run within their usual environment.
SafeActive Security Technology allows you to safely download, import, or share alien programs and files no matter what their source, while running in the SafeActive virtual environment. These programs and files modify nothing on your system. SafeActive Security Technology simulates the system in a virtual mode that permanently protects the hard drive and system from that alien file or program. The alien file or program doesn’t actually exist as part of your system; rather, it is virtualized, keeping your system safe. It’s as if those programs and files have never modified anything on your system. The reactive concept of traditional anti-malware security technology has a built-in disadvantage: Protection is always compromised due to the constant need for signature updates.
With SafeActive Security Technology, protection is independent of any signature updates, because it ensures proactive security. By classifying them as a threat by default, SafeActive Security Technology automatically blocks all entry or writing attempts of any malware, including viruses, spyware, worms, and Trojan Horses. By isolating unauthorized programs and files in its secure environment, SafeActive prevents any hidden threats from watching or damaging your PC assets; at the same time, you can keep running and enjoying those unauthorized programs that you intended to use in the first place.
Here’s an example of how SafeActive Security Technology works: A friend introduces you to an alien link where you can download a cool screen saver. You want to enjoy the screen saver; however, you’re not sure if you can trust the link, having no idea whether or not the screen saver file is infected.
SafeActive Security Technology enables you to safely access any link, whether you trust it or not, since it automatically runs your Web browser in the SafeActive Virtual Machine. By doing so, no trace of unwanted cookies, history, or other cyber junk can be found on your actual PC, because they simply cannot access it. Now you can safely download and run that cool screen saver, as it can never access your actual PC’s environment. You enjoy the good part of that screen saver installation, while any bad part is being neutralized by SafeActive Security Technology.
Look out the video!
我对这个很感兴趣。有时间要试试看。 |