Breaking News

IP Tools + security v8.8-13 (Ad-free) [Latest]


IP Security Premium is similar to IP Security.
The differences are:
-IP organisation and geographical information. For example: do you have a doubt with a web site? The web site is not in your country? Or worse you live in the US and the web site is in China or Kazakhstan? The IP security traceroute functionality will confirm if you have a risk.
-New security features: they will be available first in the premium version. For example the geographical and analysis information in Packet Inspection.
-No advertisement
-Faster response times for support
Firstly, Network Protection is a combination of tools to help you to understand your network’s configuration, any potential issues, the availability of the network and its performance.
The second set of features focuses on security in order to check if your users are vulnerable. Understanding the network and the security is crucial to knowing if you are at risk and where the attacks may come from.
The network function shows the list of WiFi access points, the one which you are registered to, and all the IP information (IP address facing the internet, DNS, DHCP, etc…).
Network Protection offers both a graphical speed test over the internet and a ping mode to easily check the availability of both the router and the servers on the internet.
Network Protection has a discovery mode with an accurate graphical representation of the devices discovered. It easily allows you to validate the devices that are connected on the network. The user interface is especially easy to use. Every device in the list can be selected to perform a ports scan to check which application is susceptible of transporting an attack.
Furthermore, to the above-mentioned security function, there are several unique security modules:
o Bad web sites: by surfing the internet, or by accessing a phishing email by mistake, the risk that the user accesses a malware web site (that will want to steal money from them) is high. Network Protection tests if you have the right measures in place to protect the users.
o Malware: this safely shows you what happens if you connect to a malware web site. By clicking on a session in a list, you can discover the city where the malware site is hosted.
o Packet Inspection: this is a real time capture of the traffic for inspection and analysis. A malware and botnets Command & Control search is assessed on the traffic.
o Phishing: this is an educational test for your users to find out if they are ready to detect abnormal characteristic in a phishing email.
o Backup: what would you do if a disk crashed or your PC was stolen? This list of questions helps to validate the measures you’ve put in place to protect your most critical data.
What’s New
Rel 8.8: New function: Risk detection
High level risk assessment to detail where to focus the protection efforts
Previously:
Applications sorting by risk
Added 2 categories: cost & spy and security
Encryption of the malware domains database to detect malware, botnet and ransomware.
Assessment of the risk associated with applications
Detailed information on the applications’ permission
Whois function bundled with DNS
Real time continuous threat detection
Compromised emails information
Screenshots
  • IP Tools and Security Premium Screenshot
  • IP Tools and Security Premium Screenshot
  • IP Tools and Security Premium Screenshot
  • IP Tools and Security Premium Screenshot
  • IP Tools and Security Premium Screenshot
  • IP Tools and Security Premium Screenshot
  • IP Tools and Security Premium Screenshot
  • IP Tools and Security Premium Screenshot
Downloads

No comments