Kaspersky Total Security icon

Kaspersky Total Security

2 big stars
Kaspersky Total Security screenshot
Name: Kaspersky Total Security
Works on: windowsWindows XP and above
Developer: Kaspersky
Version: 17
Last Updated: 14 Apr 2017
Release: 29 Jul 2016
Category: Antivirus
Rate this software:
1374 downloads
screenshotsView Screenshots(48)
commentsComments
downloadDownload
Liked it? Tell others:
details

Kaspersky Total Security Details

Works on: Windows 10 | Windows 8.1 | Windows 8 | Windows 7 | Windows XP | Windows 2000 | Windows 2003 | Windows 2008 | Windows Vista | Windows 2012
SHA1 Hash: e2c56cec8177b2c8c4fd00d85b6d0de505d61bfe
Size: 2.31 MB
File Format: exe
Rating: 2.304347826 out of 5 based on 23 user ratings
Publisher Website: External Link
Downloads: 1374
License: Demo / Trial Version
Kaspersky Total Security is a demo software by Kaspersky and works on Windows 10, Windows 8.1, Windows 8, Windows 7, Windows XP, Windows 2000, Windows 2003, Windows 2008, Windows Vista, Windows 2012.
You can download Kaspersky Total Security which is 2.31 MB in size and belongs to the software category Antivirus.
Kaspersky Total Security was released on 2016-07-29 and last updated on our database on 2017-04-14 and is currently at version 17.
download button
Thank you for downloading from SoftPaz! Your download should start any moment now. It would be great if you could rate and share:
Rate this software:
Share in your network:
features

Kaspersky Total Security Description

  • Computer Protection
  • Computer Protection protects your computer against known and new threats. Each type of threat is processed by a separate application component. This structure of the protection system allows a flexible configuration of the application, depending on the needs of any specific, or of an enterprise as a whole.
  • Protection components, providing protection of:
  • files and personal data;
  • system;
  • network activity.
  • Virus scan tasks used to scan individual files, folders, drives, areas or the entire computer for viruses.
  • Update, ensuring the up-to-date status of internal application modules, and databases used to scan for malicious programs.
  • Protection components
  • The following protection components provide defense for your computer in real time:
  • File Anti-Virus:
  • File Anti-Virus monitors the file system of the computer. It scans all files that can be opened, executed or saved on your computer, and all connected disk drives. Computer Protection intercepts each attempt to access a file and scans such file for known viruses. The file can only be processed further if the file is not infected or is successfully treated by the application. If a file cannot be disinfected for any reason, it will be deleted, with a copy of it saved in the backup, or moved to the quarantine.
  • Mail Anti-Virus:
  • Mail Anti-Virus scans all incoming and outgoing email messages on your computer. It analyzes emails for malicious programs. The email is available to the addressee only if it does not contain dangerous objects. The component also analyzes email messages to detect phishing.
  • Web Anti-Virus:
  • Web Anti-Virus intercepts and blocks scripts on websites if they pose a threat. All HTTP traffic is also subject to a thorough monitoring. The component also analyzes web pages to detect phishing.
  • IM Anti-Virus:
  • IM Anti-Virus ensures the safe use of Internet pagers. The component protects information that comes to your computer via IM protocols. IM Anti-Virus ensures safe operation of various applications for instant messaging.
  • Application Control:
  • Application Control logs the actions performed by applications in the system, and manages the applications' activities, based on which group the component assigns them to. A set of rules is defined for each group of applications. These rules manage applications' access to various resources.
  • Firewall:
  • Firewall ensures security for your work in local networks and on the Internet. The component filters all network activities using rules of two types: rules for applications and packet rules.
  • Proactive Defense:
  • Proactive Defense allows to detect a new malicious program before it performs its malicious activity. The component is designed around monitoring and analyzing the behavior of all applications installed on your computer. Based on the actions being performed, Computer Protection makes a decision whether the application is potentially dangerous, or not. So your computer is protected not only from known viruses, but from new ones as well that still have not been discovered.
  • Network Attack Blocker:
  • The Network Attack Blocker loads at the operating system startup, and tracks incoming network traffic for activities characteristic of network attacks. Once an attempt of attacking your computer is detected, Computer Protection blocks any network activity of the attacking computer towards your computer.
  • Anti-Spam:
  • Anti-Spam integrates into the mail client installed on your computer, and monitors all incoming email messages for spam. All messages containing spam are marked with a special header. The option of configuring Anti-Spam for spam processing (deleting automatically, moving to a special folder, etc.) is also provided. The component also analyzes email messages to detect phishing.
  • Network Monitor:
  • The component designed to view information about network activity in real-time mode.
  • Anti-Phishing:
  • The component, integrated into Web Anti-Virus, Anti-Spam and IM Anti-Virus, which allows to check web addresses if they are included in the list of phishing and suspicious web addresses.
  • Anti-Banner:
  • Anti-Banner blocks advertising information located on banners built into interfaces of various programs installed on your computer, or displayed online.
  • Protection of data and online activity
  • Computer Protection protects data stored on your computer against malware and unauthorized access, ensuring secure access to the local network and to the Internet.
  • Protected objects are divided into three groups:
  • Files, personal data, parameters of access to different resources (user names and passwords), information about banking cards etc. Protection of these objects is provided by File Anti-Virus, Application Control and Proactive Defense.
  • Applications installed on your computer and operating system objects. Protection of these objects is provided by Mail Anti-Virus, Web Anti-Virus, IM Anti-Virus, Application Control, Proactive Defense, Network Attack Blocker and Anti-Spam.
  • Online activity: using e-payment systems, email protection against spam and viruses etc. Protection of these objects is provided by Mail Anti-Virus, Web Anti-Virus, IM Anti-Virus, Firewall, Network Attack Blocker, Anti-Spam, Network Monitor, Anti-Banner.
  • Protection of data and online activity
  • Computer Protection protects data stored on your computer against malware and unauthorized access, ensuring secure access to the local network and to the Internet.
  • Protected objects are divided into three groups:
  • Files, personal data, parameters of access to different resources (user names and passwords), information about banking cards etc. Protection of these objects is provided by File Anti-Virus, Application Control and Proactive Defense.
  • Applications installed on your computer and operating system objects. Protection of these objects is provided by Mail Anti-Virus, Web Anti-Virus, IM Anti-Virus, Application Control, Proactive Defense, Network Attack Blocker and Anti-Spam.
  • Online activity: using e-payment systems, email protection against spam and viruses etc. Protection of these objects is provided by Mail Anti-Virus, Web Anti-Virus, IM Anti-Virus, Firewall, Network Attack Blocker, Anti-Spam, Network Monitor, Anti-Banner.
  • Control over applications and data access
  • Computer Protection prevents applications from executing actions which can endanger the system, monitors access to your personal data and provides the option of running applications in the safe mode. It is performed with the help of the following tools:
  • Application Activity Control. The component logs the actions performed by applications in the system, and manages the applications' activities, based on which group they belong to. A set of rules is defined for each group of applications. These rules manage applications' access to various resources.
  • Digital Identity Protection. Application Control manages rights of applications to perform actions on the user's personal data. They include files, folders and registry keys, which contain the settings and important data of the most frequently used applications, as well as user's files (My Documents folder, cookies, information about the user's activity).
  • Safe environment for running the applications. Computer Protection ensures the maximum security of operating system objects and the user's personal data by running unknown applications in the protected virtual environment.
  • Network Monitor
  • Network Monitor is a tool used to view information about network activities in real time. To run Network Monitor, use the Network Monitor link in the Computer Protection main window.
  • The window that will open will provide the information grouped on the following tabs:
  • The Connections and ports tab lists all the open ports and active network connections currently established on your computer.
  • The Firewall: rule processing log tab displays information about the use of packet rules for applications.
  • The Network traffic tab holds information on all inbound and outbound connections established between your computer and other computers, including web servers, mail servers, etc.
  • The Blocked computers tab lists the blocked computers.
  • Virus scan tasks
  • In addition to the constant protection of all the ways that malicious programs can penetrate, it is extremely important to periodically scan your computer for viruses. This is necessary in order to rule out the possibility of spreading malicious programs that have not been discovered by security components, for example, because the security level was set to low or for other reasons.
  • The following virus scan tasks are included in Computer Protection:
  • Object Scan. Scan of objects selected by the user. You can scan any object in the computer's file system.
  • Full Scan. A thorough scan of the entire system. The following objects are scanned by default: system memory, programs loaded on startup, system backup, email databases, hard drives, removable storage media and network drives.
  • Quick Scan. Virus scan of operating system startup objects.
currency

Where to buy?

Last updated price and discount information 6 years agoupdate now
$59.99Click the link to buy
screenshots

Kaspersky Total Security Screenshots

Kaspersky Total Security screenshot 1 Kaspersky Total Security screenshot 2 Kaspersky Total Security screenshot 3 Kaspersky Total Security screenshot 4 Kaspersky Total Security screenshot 5 Kaspersky Total Security screenshot 6 Kaspersky Total Security screenshot 7 Kaspersky Total Security screenshot 8 Kaspersky Total Security screenshot 9 Kaspersky Total Security screenshot 10 Kaspersky Total Security screenshot 11 Kaspersky Total Security screenshot 12 Kaspersky Total Security screenshot 13 Kaspersky Total Security screenshot 14 Kaspersky Total Security screenshot 15 Kaspersky Total Security screenshot 16 Kaspersky Total Security screenshot 17 Kaspersky Total Security screenshot 18 Kaspersky Total Security screenshot 19 Kaspersky Total Security screenshot 20 Kaspersky Total Security screenshot 21 Kaspersky Total Security screenshot 22 Kaspersky Total Security screenshot 23 Kaspersky Total Security screenshot 24 Kaspersky Total Security screenshot 25 Kaspersky Total Security screenshot 26 Kaspersky Total Security screenshot 27 Kaspersky Total Security screenshot 28 Kaspersky Total Security screenshot 29 Kaspersky Total Security screenshot 30 Kaspersky Total Security screenshot 31 Kaspersky Total Security screenshot 32 Kaspersky Total Security screenshot 33 Kaspersky Total Security screenshot 34 Kaspersky Total Security screenshot 35 Kaspersky Total Security screenshot 36 Kaspersky Total Security screenshot 37 Kaspersky Total Security screenshot 38 Kaspersky Total Security screenshot 39 Kaspersky Total Security screenshot 40 Kaspersky Total Security screenshot 41 Kaspersky Total Security screenshot 42 Kaspersky Total Security screenshot 43 Kaspersky Total Security screenshot 44 Kaspersky Total Security screenshot 45 Kaspersky Total Security screenshot 46 Kaspersky Total Security screenshot 47 Kaspersky Total Security screenshot 48
similarSimilar Software
Baidu Antivirus icon
Baidu Antivirus
v 5.4
free
TrothAV Antivirus icon
TrothAV Antivirus
v 3.5
non-free
PC Matic icon
PC Matic
v 1.1
non-free
REVE Antivirus icon
REVE Antivirus
v 1.2
non-free
Dr.Web Anti-virus icon
Dr.Web Anti-virus
v 11
non-free
Padvish EPS icon
Padvish EPS
v 2.2
non-free