RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Cezurity Scanner

Product
Developers: Cezurity
Last Release Date: 2018/08/09
Technology: SaaS - The software as service,  cybersecurity - Antiviruses

Content

2017: There was version 1.8

On August 9, 2017 the Cezurity company announced release of the version of the Cezurity Scanner program. She acts as a principal component of anti-virus service Cezurity for home users.

The latest version of Scanner is capable to interact with the cloud analytical Sensa system in real time. It allows the program to reveal infections which already occurred also separate dangerous actions or events. Dangerous action on the computer can be blocked before there was infection[1].

Scanner checks operation of the computer by two methods:

  • basic for anti-virus service Cezurity is "check of cuts" (slice check). Information on work of the operating system and applications gathers on the computer — the cut of a system (slice) forms. The cut represents a computer status at a given time. Scanner transfers cuts to the cloud Sensa system where they are analyzed. Check of a cut gives a cloud system the complete information about a computer status that allows to analyze interrelations of objects and processes on it. It is so possible to reveal active infection and to carry out its complete removal. The verdict of Sensa has higher level of reliability in comparison with local anti-virus checks on signature bases. But transfer of cuts to Sensa happens periodically and therefore leads to detection only of active infections — i.e. those which already occurred.
  • "pulse checks" (impulse check) which take place in real time and allow to block separate dangerous actions before they lead to infection. Pulse checks represent collecting and sending to Sensa of data on separate actions or events in a system which can affect security. For example, start of the program, installation of the driver or loading of the module can appear such event. Unlike check of a cut which happens periodically pulse check is automatically started at the time of approach of an event. A problem of pulse checks — quickly to receive from Sensa the answer about whether there is in an event a danger. If a cloud system already knows that some action bears danger, it will be blocked in real time ("on the fly"). It will allow to prevent infection.

If about danger of an event Sensa has no exact verdict, in a cloud its assessment will begin: the Sensa system will apply new methods of the analysis, additional parts, for example, about an event context can be requested. As soon as Sensa defines that the event is dangerous, check of a cut will be started on all computers where it met. Check of a cut will provide to Sensa the complete information about a status of these computers that will allow to find the remained signs of infection and to completely eliminate threat.

As soon as the danger of an event is confirmed, Sensa will begin to block automatically actions which bring to it.

File:Aquote1.png
Local checks cannot provide the acceptable level of protection against malware any more. It is a deadlock way as even insignificant increase in reliability leads to strong deceleration of the computer. We took an important step — free of charge provided to a wide range of users really easy protection from a cloud which does not require either signature bases, or any other local indicators of a compromise and can be used together with any of popular antiviruses.

Sergey Lapshin, manager of projects of Cezurity
File:Aquote2.png

In connection with change of a core of a product the version got number 1.8.

For August 9, 2017 loading of Scanner v1.8 is available.

2015: Cezurity: free anti-virus service

For November 10, 2015 Cezurity Scanner is free anti-virus service. It is intended for home users and allows to find and cure infection quickly. Extends mainly through VKontakte (from 2012 Cezurity – the partner of VK in the field of security) and through Yandex. Scanner is used more than 1M by the person. Key advantage – the service allows to detect threats which are directed to separate categories of users – for example, on participants of social network (decides at the expense of a cloud computing architecture of the solution and partnership with technical support of VKontakte).

Notes