About

Top Previous Next

 

 

BufferZone™ protects your computer against spyware installation, theft of information, hijacking of your desktop, and damage to your operating system delivered through Browsers, Email, P2P applications and Instant Messengers (in the Pro version).

BufferZone™ provides continuous protection against cyber threats — known and unknown, current and future — including Trojan horses, viruses, spyware, and newer morphing and blended threats. Acting as a kernel driver, BufferZone™ intercepts every unknown application, making it an excellent way to defend personal computers.

 

BufferZone™ uses a unique Security through Virtualization approach that dynamically isolates and safely executes

all non-trusted content, instead of trying to scan content and detect malicious code. With BufferZone™, you can safely execute any application as well as download and use any files with your normal applications, preferences and settings. Programs running in

BufferZone™ cannot attack your files and system resources, and cannot steal your personal data.

 

BufferZone™ protection prevents attacks such as:

§ "In the Wild" (known) viruses, worms, Trojan horses

§ "Zero Day" (unknown) viruses, worms, Trojan horses

§ Spyware

§ Adware

§ Application vulnerabilities

 

Because BufferZone™ doesn't depend upon signatures, heuristics, or other ways of recognizing threats, it never requires signatures or definitions updating when new forms of attack emerge. Once you install BufferZone™, you're protected now and in the future.