Kindly be advised we cannot cancel subscriptions or issue refunds on the forum.
You may cancel your Bitdefender subscription from Bitdefender Central or by contacting Customer Support at: https://www.bitdefender.com/consumer/support/help/

Thank you for your understanding.

Bitdefender Defense Mechanism Against Malwares

Options

I am new to Bitdefender and currently evaluating the product and wants to know the Bitdefender Protection Layers or Defense Systems (signature based, heuristics etc) to detect viruses, malware etc?

Comments

  • rootkit
    rootkit ✭✭✭
    edited April 2012
    Options

    Hello :)


    You have here all the new features from the product:


    http://www.bitdefender.com/solutions/total...y.html#Features


    Also, our awards are listed here:


    http://www.bitdefender.com/site/view/awards.html


    You have here all the details about some of our technologies:


    http://www.bitdefender.com/media/materials..._control_wp.pdf


    http://www.bitdefender.com/media/materials..._to_Success.pdf


    http://en.wikipedia.org/wiki/BitDefender#B...er_Technologies


    Let me know if you have other questions.


    Have a great weekend!

  • Thanks for replying in detail. The text on the diagram (The BitDefender Scanning Sequence) on the page 7 of the document "active_virus_control_wp.pdf" is not clear, it is blur. Please send the clear graphics of the detection sequence.

  • rootkit
    rootkit ✭✭✭
    Options
    Thanks for replying in detail. The text on the diagram (The BitDefender Scanning Sequence) on the page 7 of the document "active_virus_control_wp.pdf" is not clear, it is blur. Please send the clear graphics of the detection sequence.


    Hello :)


    That is the consequence of shrinking the screenshot. Please magnify to 200% in your PDF reader and you will be able to read the text.


    Take care.

  • What about File Emulation technique and how it is different from Behavioral Detection?

  • rootkit
    rootkit ✭✭✭
    Options

    Hi :)


    The Behavioral Detection uses the File Emulation technique and runs a file in a virtual environment. After this, the module is observing the behavior(what resources needs in order to run, what is the active folder, which registry keys is creating).


    We have some strict rules set for the module and if the threshold is reached, the file will be automatically blocked.


    Take care.

  • .....That is the consequence of shrinking the screenshot. Please magnify to 200% in your PDF reader and you will be able to read the text....


    Image still not clear :(

  • rootkit
    rootkit ✭✭✭
    Options

    Hello :)


    I don't have another screenshot, that document is old.


    Read the text and you will understand the mechanism.


    Take care.