AS Anti-Hacker
  Home and Small Office
  Enterprise Solution
     AS Anti-Hacker Enterprise
  SaaS Solution
  Upgrade
  Example
AS Anti-Virus
Secure Backup System (SBS)
Privacy-Security (PS)

WinTools

DC Photo Organizer
Photo2Album
Security Services
Product Registration


 
Buy Now!
Testimonials
Comparison
Example
Press Release
Help
System Requirement
Subscription
 
AS Anti-Hacker works with Anti-Virus and Firewall (Internet Security)
to provide complete protection.
Free Protection Updates for 1 Year!
 
Internal Problem:
According to several U.S. reports, over 98% of IT Administrators have the right or the capability to obtain files of all computers in the company.
By using AS Anti-Hacker Enterprise, even your IT Administrators cannot see your private files.
 
Enterprise Edition :  
AS Anti-Hacker Enterprise is designed for business users to comprehensively protect their confidential files and important Internet activities including Internet banking, online transactions, e-mail applications, file transfers, data communications and so on.

AS Anti-Hacker Enterprise works with Anti-Virus and Firewall (Internet Security) to provide complete protection against internal and external hackers as well as potential threats.

The complete solution of AS Anti-Hacker Enterprise includes Active Protect, Insecure Website Detection Loop (IWDL™), Password Entry Protection Gate (PEPG™), Computer Cleaning, Quick System Scan, Full System Scan, Auto-Update, Security Tools and Secure Folder. 
 
Key Features :  
  Active Protect  Auto-Update
 Insecure Website Detection Loop (IWDL™)  Security Tools
 Password Entry Protection Gate (PEPG™)   Secure Folder
  Computer Cleaning   Protection Level
  System Scan  
 
Technology Overview :  
  Active Protect and Auto-Update   1024-Bit Secure Encryption
  Insecure Website Detection Loop (IWDL™)  Compound Icon Processing Technique (CIPT™)
 Password Entry Protection Gate (PEPG™)  Compression-Encryption Technology
  
Key Features

Active Protect
Active Protect provides automatic real-time protection against mass attacks of internal and external hackers. This also ensures that no setting is required after 3-minute installation of AS Anti-Hacker.

Insecure Website Detection Loop (IWDL™)
IWDL™ automatically detects insecure and fraudulent websites and alerts users to avoid potential threats. It stops hacker programs before they appear to enter your computers.

Password Entry Protection Gate (PEPG™)
PEPG™ automatically protects your password entry during logon of any applications (including e-mail, Internet banking, online transactions, communication tools, etc). It prevents your password entry from being captured by hidden hackers. For detail, please visit http://www.availasoft.com/products/pepg.html.

Computer Cleaning

Computer Cleaning automatically cleans Windows System and Internet Explorer to improve computer security and performance. This also ensures that your computer will not be monitored by Tracking Cookies or other trackware.


System Scan
Quick System Scan - Automatically searches for active hacker programs and potential threats.
Full System Scan - Comprehensively searches for active and inactive hacker programs, and hidden threats on the whole computer.


Auto-Update
Auto-Update function of AS Anti-Hacker automatically updates your hacker definitions and insecure websites from AvailaSoft when your computer is connected to the Internet. This ensures that you are protected against the latest hackers and threats.

12 months of Auto-Update are included with purchase of AS Anti-Hacker Enterprise. Annual subscriptions are available for subsequent Auto-Update.


Security Tools
[Encrypt As *.exe] - 1024-Bit Secure Encryption is provided for protecting your important files and folders. It is useful for your secure backup and file transfer.
[Securely Delete] - "Securely Delete" function is provided for irrecoverably erasing confidential files so that any "undelete" software cannot recover them.

Secure Folder
Files and folders kept in Secure Folder are automatically encrypted by 1024-bit Secure Encryption Technology.

Compound Icon Processing Technique (CIPT™) adds Security Locks to icons of these files to represent encrypted states.


Protection Level
AS Anti-Hacker Enterprise provides the Highest Protection Level. It is optimized for computers on office network.

Technology Overview
Active Protect and Auto-Update
  Active Protect of AS Anti-Hacker constantly and automatically protects your computer from internal and external hackers. Auto-Update of AS Anti-Hacker automatically updates your hacker definition database from AvailaSoft when your computer is connected to the Internet in order to protect you from new hackers found in the market.
Insecure Website Detection Loop (IWDL™)
  Insecure Website Detection Loop (IWDL™) automatically detects insecure and fraudulent websites and prompt users to cancel the visit to avoid any potential threats.
Password Entry Protection Gate (PEPG™)
  Password Entry Protection Gate (PEPG™) automatically protects your password entry during logon of any applications (including e-mail, Internet banking, online transactions, communication tools, etc). It prevents your password entry from being captured by hidden hackers. For detail, please visit http://www.availasoft.com/products/pepg.html.
1024-Bit Secure Encryption
  Most vendors in the IT security market only provide 128-bit encryption technology that is liable to be decrypted by high-end computers and experienced hackers. AvailaSoft adopts advanced encryption technology in AS Anti-Hacker. The encryption processes of AS Anti-Hacker are implemented by using 1024-bit encryption technology.
Compound Icon Processing Technique (CIPT™)
  Our Compound Icon Processing Technique (CIPT™) makes Secure Folder of AS Anti-Hacker Enterprise incredibly user-friendly and convenient. You just move selected files and folders into Secure Folder shown on Desktop. All these files under the Secure Folder will be automatically encrypted. Security Locks are added to icons of these files to represent encrypted state by our Compound Icon Processing Technique (CIPT™).
Compression-Encryption Technology
  Unlike other compression-encryption technology used for creating compressed and encrypted self-extract <*.exe> files by most vendors in the market that can be broken in by average hackers, AS Anti-Hacker adopts its advanced compression-encryption technology for creating compressed and encrypted self-extract <*.exe> files. It is impossible for any hackers to break through it.