New Kaspersky products hit the market

July 2011 Information Security, Residential Estate (Industry), Products & Solutions

Kaspersky Lab has released the 2012 versions of its home user products - Kaspersky Internet Security and Kaspersky Anti-Virus - designed to provide Internet users with maximum protection and convenience.

Eugene Kaspersky, CEO and co-founder of Kaspersky Lab, says: “The new 2012 versions feature integrated protection technologies designed to combat even the most complex of threats. At the same time, these products are now simpler and more user-friendly than ever before. Many of the modules featured in Kaspersky Internet Security 2012, such as Web-antivirus, heuristics, the threat rating sub-system and anti-rootkit components have been made easier to update and now interact more effectively with cloud technologies.”

The all-new products incorporate a sandbox for launching suspicious applications, a program activity monitoring module, a script emulator, a cloud-based reputation database and a virtual keyboard plus more. A host of new and improved features is also included.

Protection against unknown threats

New malware appears at an extremely rapid rate these days — roughly 70 000 new malicious programs each day. There are no signatures for these new threats, meaning innovative methods are required to detect them. Kaspersky Internet Security 2012 and Kaspersky Anti-Virus 2012 effectively neutralise new threats using non-signature-based behavioural analysis of suspicious programs. Kaspersky Lab's latest products are capable of tracking program activity during present and previous work sessions.

Monitoring program activity uses data from other components, such as the proactive protection module, e-mail, Web and IM anti-virus components, the firewall, etc. The monitoring module tracks complete chains of events that could impact security, and literally pieces together an entire picture of program operations or even groups of operations affected by malware. If there have been a number of related incidents on your computer, all the monitoring module needs is to detect one of them in order to find all of the others. Importantly, it is now possible to cancel and roll back all of the actions executed by a program not only in the current working session, as was the case with Kaspersky Internet Security 2011 and Kaspersky Anti-Virus 2012, but in previous working sessions too. Furthermore, the list of actions that can be cancelled has been expanded to include the creation, renaming and modification of files, as well as changes to or new entries in the system registry, etc.

 Malicious activity detection has also taken a step forward with the use of behavioural templates. Kaspersky Lab data about malicious programs is incorporated into these templates and a centralised database helps to quickly locate unknown malicious code with complex behavioural patterns.

Improved protection from the cloud

In the 2012 versions of Kaspersky Lab's home user products, cloud-based technologies have been improved. By regularly exchanging information between products installed on users’ machines and the centralised databases in the cloud, the most up-to-date threat information is made available for the protection of users. Now, in addition to superior protection from the cloud, the new product versions also demonstrate how they do it. The main program window provides users with in-depth information about which cloud components are active and how they are protecting users’ computers and personal data.

With one click, users of Kaspersky Internet Security 2012 and Kaspersky Anti-Virus 2012 can find out about the reputation of any file on a local computer and make an informed decision as to whether or not to use it. All users need to do is right-click on the file’s icon and select the ‘View file reputation in KSN’ menu option. Users will then be shown the file's threat rating as determined by the Kaspersky Security Network cloud service, which has been improved since its inception and development three years ago. In addition to a file’s rating, users can also find out about the geographical distribution of the file, the level of trust attributed to it by other users and other similar information stored by Kaspersky Lab’s cloud tracking and rapid response systems.

Convenience and speed

Kaspersky Internet Security 2012 and Kaspersky Anti-Virus 2012 are both high-performance products designed for minimal impact on your computer’s running speed and program operations. Kaspersky Lab’s products have been streamlined for optimal day-to-day use when surfing the Internet, searching for and viewing web pages, making VoIP calls, watching HD videos and playing online games, etc.

The intelligent update system downloads updates for active product components only and launches them immediately after they have been plugged in. That means that anti-virus database components are kept right up-to-date and download traffic is minimised. The update launch mode has been adapted to suit typical laptop and desktop work modes and will not slow down performance when operating system activity is resumed or a user launches programs.

www.kaspersky.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Check Point launches open, vendor-neutral MDR services
Information Security News & Events Products & Solutions
New Check Point MDR 360° and MXDR 360° offerings deliver 24/7 managed continuous threat monitoring protection across endpoints, cloud and network environments with built-in identity threat detection and 160+ integrations across hybrid, multi-vendor environments.

Read more...
Credential theft surges in South Africa
NEC XON Information Security
NEC XON issues a critical cybersecurity warning about the dual threat of massive credential theft and AI-powered cyberattacks sweeping across the region, with an increasing number of incidents and evolving threat tactics.

Read more...
Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
Secure, modernise and optimise CCTV
Surveillance Products & Solutions
Industrial and commercial organisations are navigating complex digital transformation processes. With SecuVue, companies can bridge the gap between operational technology and information technology for safer, smarter operations.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.