Differences And Simular Features Of Bitdefender 2013

What is the difference between, and some of the seemingly overlapping features of v.2013?


I know this is not a perfect or exhaustive list, but just to give new users some quick reference information. ~ 95% of the below was taken from the Bitdefender manual. Hope this is of some help. :)


6 categories with their summery observations.


1) Safepay, Sandbox and Privacy (Antiphishing) for internet browsing:


Safepay:


Bitdefender Safepay offers the following features:


• It blocks access to your desktop and any attempt to take snapshots of your screen.


• It comes with a virtual keyboard which, when used, makes it impossible for hackers to read your keystrokes.


• It is completely independent from your other browsers.


• It comes with built-in hotspot protection to be used when your computer is connected to unsecured Wi-fi networks.


• It supports bookmarks and allows you to navigate between your favorite banking/shopping sites.


• It is not limited to banking and e-shopping. Any website can be opened in Bitdefender Safepay.


Sandbox:


It too is isolated from the operating system. This prevents browser-based threats from


exploiting browser vulnerabilities to gain control of your system. Use Sandbox


when visiting web pages you suspect may contain malware.


• It does not offer complete blocking of your desktop as far as screen snapshots like Safepay does.


• It does not include the Safepay Keyboard.


Note: Sandbox is not available on computers running Windows XP.


Privacy (Antiphishing):


Is for your normal day to day web browsing security. It is as the Auto Pilot is to Bitdefender for the internet, running multiple security features automatically as we surf the web. Its features are:


• Search advisor, a component that rates the results of your search engine queries and the links posted on social networking websites by placing its color coded icon next to every result.


• Protection against fraud


• Protection against phishing


• Protection against malware


• Can create White lists of web sites you fully trust, that will not be impeded or hindered by the Bitdefender Antiphishing protection.


• Page rating, color rating displayed on the left side of the Toolbar.


• Web browser Toolbar Settings


• Feature can be disabled, shut off.


2) On-Access and Active Virus Control:


On-Access:


Provides continuous, real-time protection against a wide range of malware threats by scanning all accessed files, e-mail messages and the communications through Instant Messaging Software applications (ICQ, NetMeeting, Yahoo Messenger, MSN Messenger).


• Has 3 slider options, and can be customized according to your needs.


Active Virus Control:


Bitdefender Active Virus Control is an innovative proactive detection technology which uses advanced heuristic methods to detect new potential threats in real time.


Active Virus Control continuously monitors the applications running on the computer, looking for malware-like actions. Each of these actions is scored and an overall score is computed for each process. When the overall score for a process reaches a given threshold, the process is considered to be harmful and it is blocked automatically.


• Has 3 slider options only.


3)Auto Scanning of a USB/DVD devices verses using the USB Immunizer:


Auto Scanning of USB/DVD:


• If auto scan is enabled through settings, will automatically run a scan in the background (scan icon will appear in the system tray) of the removable media.


• Scans every time the removable media is inserted (when set to Autoscan)


• Scan feature can be individually set to Autoscan, Disable or Ask.



USB Immunizer:


With USB Immunizer you can prevent any NTFS, FAT32 or FAT formatted flash drive from automatically executing malware ever again. Once an USB device is immunized, malware can no longer configure it to run a certain application when the device is connected to a computer running Windows.


4) Intrusion Detection System and Active Virus Control:


Intrusion Detection System:


• Detects unwanted access to system resources and blocks applications from disabling and/or manipulating computer system.


• If there are applications you trust and do not want the Intrusion Detection System to scan, you can add exclusion rules for them. The operation of the Intrusion Detection System is related to that of the Active Virus Control. Process exclusion rules apply to both systems.


• Seems to be more of a known and "brute force" analysis of malware attacks. (personal interoperation)


• Has 3 slider security settings.



Active Virus Control:


Bitdefender Active Virus Control is an innovative proactive detection technology which uses advanced heuristic methods to detect new potential threats in real time.


Active Virus Control continuously monitors the applications running on the computer, looking for malware-like actions. Each of these actions is scored and an overall score is computed for each process. When the overall score for a process reaches a given threshold, the process is considered to be harmful and it is blocked automatically.


• The operation of the Intrusion Detection System is related to that of the Active Virus Control. Process exclusion rules apply to both systems.


• Uses more behavior/heuristic analysis of malware attacks/processes.


• Has 3 slider security settings.



5) Paranoid Mode and Stealth Mode:


Paranoid mode:


As long as Paranoid Mode is on, an alert will be displayed prompting you for action every time one of the following situations occurs:


• An application tries to connect to the Internet.


• An application tries to perform an action considered suspicious by the Intrusion Detection System or the Active Virus Control.


• The alert contains detailed information regarding the application and the detected behavior. You must select to Allow or Deny the action using the corresponding button.


• Auto Pilot will automatically be switched off when Paranoid mode is on.


Stealth mode:


When Stealth Mode is on, your computer is invisible from both the local network and the Internet.


When turned on can cause issues with devices such as wireless printers, network printers etc.


6) Game Mode and Laptop Mode:


Game mode:


Game Mode temporarily modifies protection settings so as to minimize their impact on system performance. The following settings are applied when Game Mode is on:


• All Bitdefender alerts and pop-ups are disabled.


• On-access scanning is set to the Permissive protection level.


• Autoscan is turned off. Autoscan finds and uses time-slices when system resource usage falls below a certain threshold to perform recurring scans of the entire system.


• The Bitdefender firewall is set to normal mode (Paranoide Mode is turned off). This means that all new connections (both incoming and outgoing) are automatically allowed, regardless of the port and protocol being used.


• Auto Update is turned off.


• The Bitdefender toolbar in your web browser is disabled when you play browser-based online games.


While in Game Mode, you can see the letter G over the Bitdefender icon.


Laptop Mode:


Laptop Mode is especially designed for laptop and notebook users. Its purpose is to minimize Bitdefender's impact on power consumption while these devices are running on battery. When Bitdefender operates in Laptop Mode,


• the Autoscan and Auto Update features are turned off, as they require more system resources and, implicitly, increase power consumption.


Bitdefender detects when your laptop has switched to battery power and it automatically enters Laptop Mode. Likewise, Bitdefender automatically exits Laptop Mode, when it detects the laptop is no longer running on battery.


In some cases of the seemingly overlapping or redundant process or choices, are what makes Bitdefender Suites one of, if not the best, in whole dynamic protection of our operating systems.


Any further information including settings for the above, can be found on the bottom right corner of Bitdefender's home window, Help and Support -> Bitdefender Help -> click to browse the help manual, which can also be accessed while offline.

Comments

  • columbo
    columbo
    edited July 2012

    Christian, I know you've been incredibly busy, and have accomplished so much on the 2013 side of the forum page...it looks good, you've been doing excellent work :)


    Yet, if you have the time and see something that needs to be edited for clarification or accuracy in my thread, please do so.


    Thanks :)

  • Excellent work. Your efforts are appreciable. Keep it up.

  • Thank you :):) as are your excellent posts and threads, ONT :)

  • rootkit
    rootkit ✭✭✭
    edited July 2012

    Hello :)


    This topic is great, some users will find the definitions and your personal observations useful


    Thank you very much for your feedback!


    I will pin this topic to this area.


    Take care.

This discussion has been closed.