Our Antivirus Solution
As a managed IT services provider, PCR offers comprehensive virus protection services to secure your network and protect you against threats; this includes providing an antivirus software solution. We offer the ESET NOD32 program to prevent, detect, and remove malware.
ESET NOD32—Antivirus for Windows
We are proud to provide the ESET NOD32 antivirus program to our partners. Commonly known as NOD32, this antivirus software package protects more than 110 million users worldwide.
Our antivirus solution guards against all types of malware, including:
NOD32 established phishing and ransomware protection to keep your private information secure. With this software, you can work efficiently on the internet without worry.
An important part of antivirus protection is preventing computer viruses from infecting your system. Intrusion protection is an important layer of security that incorporates two systems—an intrusion detection system (IDS) and an intrusion prevention system (IPS). The main difference between intrusion prevention and intrusion detection is IDS monitors your network, whereas IPS controls it.
Intrusion protection is particularly useful for businesses that have challenges with security patching, handling several applications, or an abundance of third-party providers with differing operating systems. This is because the more applications you have, the harder it is to keep security and maintenance patches up to date.
Types of Intrusion Prevention Systems
An intrusion prevention system uses various methods to detect malicious activity. Signature, anomaly, and policy-based detection are the top three methods typically used to identify a threat.
- Signature-based detection: This is a type of system that monitors uniquely identifiable “signatures” that consist of well-known or previously identified network threats. If an attack is identified, the system blocks any further action.
- Anomaly-based detection: An anomaly-based system recognizes unusual network traffic based on baseline performance levels. If unusual traffic is detected, it will block further action—much like signature detection.
- Policy-based detection: This requires system administrators to launch security policies that follow organizational security policies and the network setup. If activity violates those predetermined security policies, the system is triggered and alerts you.