PC Protection & Maintenance
PC Protection & Maintenance Plan
The Realtime Shield blocks threats that are listed in our security solutions intelligence network and in our own community database. If the shield identified a known threat, it immediately blocks and quarantines the item before it causes damage to your computer or steals any sensitive information. If it detects a suspicious file, our anti-virus solution will open an alert that will allow you to block or allow the item through.
As you browse the internet, our Web Shield alerts you to websites that may pose a threat. Likewise, when you use a search engine, the Web Shield analyzes the search results and displays an image next to each link, letting you know whether it’s a trusted site or a potential risk to your computer.
The Firewall monitors data traffic traveling out of your computer. It looks for untrusted processes that try to connect to the Internet and steal your personal information. By working along with the Windows firewall, which monitors data traffic coming into your computer, your network has both inboudn and outbound protection.
Once items are moved to the quarantine they are disabled and cannot harm your computer. However, you may want to delete or restore quarantine items in some circumstances:
If you want to conserve disk space you may delete items in quarantine permanently.
If a program is not working correctly without a quarantined item you may choose to restore the file.
The identity shield secures your browsing sessions against Trojans, phishing attacks, and identity theft. It ensures that your personal information such as user names, passwords, security codes, account numbers, and credit card numbers stay protected as you bank, shop, and interact online.
The phishing shield identifies and blocks fake websites that trick you into entering your personal information. As you browse URLs are evaluated in real time for phishing risks. Analysis includes looking at page content, domain reputation, and numerous other factors.
System analyzer scans for threats, security vulnerabilities, and other details about your computer, including critical Operating System, hardware, and software information. This way, you can spot potential risks and security gaps before they become a problem, as well as identify causes for system slowness.
System optimizer protects your privacy by wiping away traces of your online activity as well as files that show your computer use. Reclaim hard drive space by eliminating browser cache, cookies, and temporary files.
Remote monitoring of system health and performance to proactively prevent system failures
Monitors memory, storage, and CPU usage
Quickly identify failing services, processes, and programs
Monitor system hardware and software changes
Includes remote support software client for quicker service calls
Eligible for discounted remote support services
(Monthly Charge, Per Device)
Speak to an IT expert
Book a free consultation today!