System and Application Guard New!
You need protection against serious security breaches caused when a malicious program piggy-backs on a legitimate application or uses its settings or credentials to conduct malicious activity (stealing IDs or personal data, sending spam, hijacking electronic wallet contents, exploiting vulnerabilities to implant malware, etc.). The new version of Outpost includes two tools specifically designed to prevent this type of illegal behavior.
Application Guard learns which Internet-enabled applications are typically started on a computer (e.g., web browsers, instant messengers, online games, etc.). It does this by leveraging the statistics collected via Agnitum’s ImproveNet knowledge base, which enables Outpost to automatically protect those programs against inadvertently sharing their resources or being hijacked by malware. In this way, all the important elements of these applications, such as cookie files, browser history, cached login passwords, and other personalized data that could be misused are closely protected against inappropriate access. You can add custom exclusions to allow certain programs to continue to read these protected contents for normal computer operations.
System Guard complements Outpost’s Proactive Protection module, enabling you to define a list of protected programs on your system, as well as extensive Windows settings and configuration files. These might include registry settings, networking properties, Hosts file accessibility, Flash and Reader plug-ins interactions and other objects vulnerable to attacks. All these are shielded by System Guard against unauthorized tampering or compromise.
These two modules further bolster protection and integrity of your system and application files and give you advanced tools to control how applications interact and share resources.
File and folder lock New!
You can block access to your personal content (documents, files, folders, pictures, etc.) or protect a sensitive folder on your system by browsing to the target location and confirming your action within Outpost’s Proactive Protection panel. After that, the protected element will be inaccessible to other users or software unless it is unblocked by entering a valid configuration password. What distinguishes this feature from other similar programs is that the access restriction would appear as a normal Windows limitation, informing users that they have insufficient privileges to access the object; your role in establishing the protection would remain hidden. This function is especially useful if you want to hide sensitive information on a shared computer, such as videos of your latest vacation, from colleagues or family members. It can also shield your data from malware corruption and spyware attacks.
Preemptive threat protection Enhanced!
Outpost Security Suite Pro provides the first line of defense against malicious software by proactively controlling how programs behave and interact on a PC and preventing security breaches. The Proactive Protection module preemptively monitors for and blocks sophisticated hacking techniques used to compromise or steal data. By analyzing threats and displaying actionable alerts, the suite blocks zero-day attacks and other unauthorized activities, providing advanced protection against botnets, rootkits, and inadvertent data disclosure.
New! This latest version extends the range of monitored events and operations for even better and more customizable protection. Outpost Security Suite excels in all currently-known leaktests, with additional focus on advanced threats that modify key system areas and hijack legitimate applications.
Today’s malware frequently seeks to shut down security software to make its infection process easier. By incorporating solid tamper-proof protection for all its components, Outpost Security Suite makes it impossible for anyone except the authorized user of the program to disable or shut down active protection.
Network security & continuity
Application access control
The firewall controls which programs are allowed to access the Internet, proactively protecting your PC against both zero-day threats and malware attempts to "phone home" or enter your PC.
Optimized firewall New!
The overhauled firewall has been made compatible with the native Windows Filtering Platform, which has resulted in significant improvements in the speed and compatibility of firewall operations. It now prioritizes certain type of traffic and checks P2P and other intensive data streams in a more intelligent manner, which results in enhanced system performance and responsiveness.
The two-way firewall monitors your computer’s inbound and outbound connections and prevents local and remote unauthorized network access. It conceals access ports, making your presence on the Internet invisible to hackers and vulnerability probes. The Ethernet Protection module of the suite guards your network connections and prevents insider attacks by controlling the transmission of data over the network. This eliminates the potential risk for data such as chat windows or authenticated browser sessions to be delivered to the wrong destination or intercepted while in transit.
Outpost Security Suite protects all types of connection (Ethernet, Wi-Fi, DSL, cable, cellular, and dial-up), automatically applying the necessary security settings when the computer is connected to a new provider. Wi-Fi connections get extra protection against eavesdropping and illegal penetration.
The Attack Detection module automatically blocks known types of hacker attacks from entering your computer.
360-degree anti malware Enhanced!
Both anti-virus and anti-spyware functions are provided through the universal anti- malware module, which ensures that your computer is kept clean of any malicious program that might infect it while you’re surfing the web or sharing files via USB stick or CD. The on-access monitor constantly watches for and instantly disinfects, quarantines or removes any malware objects found in key areas of the PC, while the on-demand scanner lets you scan for and remove threats on hard disks, network folders, DVDs, or external storage devices. Email attachments are checked in real time as they leave or arrive, and you can move any suspicious file to the quarantine area for later review. Additional anti-malware protection now prevents known rootkits and other sophisticated malware from loading and embedding themselves on your PC.
Modernized AV engine Improved!
The anti-malware engine checks more objects with increased intensity, and provides for even more thorough, fast, and efficient security scans.
Email and USB devices instant check Improved!
Removable memory storage such as USB drives are automatically checked for viruses immediately after they are connected to your computer; email is checked on both the incoming and outgoing stages, ensuring you don’t get infected by others and your email poses no threat to the recipients.
Heuristics analyzer for autorun objects New!
The Outpost anti-malware engine checks suspicious objects that are configured to start each time Windows boots up, looking for patterns indicating potential threats or weaknesses in the system. This measure increases protection against packed exploits and malicious executable files that cannot be identified using conventional signature-based methods alone.
Better manageable malware quarantine Improved!
After a suspicious object is placed into the quarantine area and isolated from future access, users can investigate how this element should be treated using a variety of web-based resources. If this action does not produce an answer, the item can be submitted to Agnitum engineers for evaluation. If the response is negative, meaning the file is benign and safe to be used, the object can easily be restored to its original location, avoiding any system disruptions. The quarantine area is detailed yet intuitive and easy to use.
Faster, more intelligent scans
SmartScan 3, Outpost’s intelligent file sensing monitor, ensures that only the modified portions of the file system are scanned, avoiding repeat scans of files that have not changed since the last scan. The fast and intelligent anti-malware engine does not impact overall system performance and can operate in the background while you work.
SmartScan has been further optimized to deliver up to ten times faster anti-malware performance for some scan and datastream checking operations.
Scheduled scans and exclusions
You can set up a flexible schedule for regular malware scans, plus you can define custom scanning criteria such as checking critical system areas whenever malware definitions have been updated.
Email and web: privacy and safety
Keyword-based blocking Reinstated!
Following requests from users, Outpost now once again lets users specify keywords that will automatically trigger the program to block the display of a requested web page containing those keywords, either in the url or the page itself. Your children probably won’t appreciate your using this function to block game sites, but you’ll be safe in knowledge that they are not wasting their homework time on illicit tasks.
Protection from spam
Outpost Security Suite Pro’s Bayesian anti-spam engine will keep your inbox free of junk email. You can train it to recognize and use your personal definition of spam, so it becomes more efficient and an even greater time saver the longer you use it. Outpost’s antispam now features full support for the popular The Bat! email client.
Email is one of the primary sources of PC compromise. Outpost can be configured to protect your email from unsafe elements such as virus-infected attachments, embedded malicious graphics, dangerous scripts and privacy-disrupting tracking elements in an HTML-message.
Unsafe web site access restriction
Outpost can optionally alert and block access to potentially malicious or unwanted web sites based on an updated list of unsafe URLs. These addresses are supplied automatically in accordance with ImproveNet statistics, which aggregate information based on monitoring for sites involved in illegitimate operations such as spam and malware distribution, phishing scams and other harmful activity. This filtering ensures you won’t inadvertently become a victim of drive-by malware infection or phishing attacks designed to steal your passwords, login information and other sensitive data. The list of blocked sites is updated via the automatic updates and can be edited to reflect your preferences.
IP Blocklist keeps surfing clean
Based on the BlockPost plug-in in earlier versions of Outpost , the integrated IP Blocklist feature lets users restrict access to specified Internet domains. A valuable tool for individuals, network administrators, and concerned parents, IP Blocklist will deny incoming/outgoing connectivity to harmful websites such as those distributing spyware or delivering inappropriate ads and graphical spam. The blocked entries can either be manually defined or imported as an aggregated list from community-maintained sources, and the feature will automatically resolve URL addresses belonging to a specified web site.
Safe repository for personal data
Any confidential information — for example, bank account numbers and passwords — that you define using ID Block is stopped from leaving the confines of your PC through communication channels such as IM, web or email. ID Block protects you against identity theft and phishing attacks that target personal, confidential information. Plus, it ensures that no-one else — including other members of your household — can accidentally or deliberately disclose this information on the web.
Ad-free, anonymous surfing
By managing cookies and external referral URLs, Outpost lets you maintain a high level of privacy when visiting shopping, entertainment or news sites while at the same time allowing trusted sites to collect only the information needed to personalize pages for you. Additionally, the suite lets you limit the elements displayed on web pages, providing cleaner and faster browsing. You can also define the sites that are permitted (or not permitted) to display images, rotate advertising banners, execute external code such as ActiveX or Java scripts, or deliver pop-ups. The latest version of Outpost ensures compatibility with even the most complex and sophisticated websites, delivering smooth performance and heightened online safety.
Tracking & Control
Program activity monitor at your fingertips New!
You can monitor advanced system events and the interactions of any running programs with the new tool included in the Outpost 2010 lineup. This "designed for geeks" functionality is similar to dedicated utilities such as Microsoft’s Process Monitor (the evolution of FileMon and RegMon utilities) and enables you to track the under-the-hood activities of any running process, including any real-time system registry modifications, files being accessed and a variety of other operational data. This facilitates better understanding of a multitude of events happening on your PC, and enables you to control which actions are permissible. You can pause/resume monitoring to concentrate on what’s relevant at the moment or take a snapshot to review past events later on.
Quick status overview
All important operational parameters are displayed in Outpost’s main interface, acting like a car’s dashboard to show all key data. Additionally, all basic configurations are accessible right from the interface, so you can make quick setting adjustments on the fly.
Whenever Outpost triggers a security alert, prompting for a user’s decision, a wide range of relevant data is displayed to facilitate better decision making. Outpost provides extensive information on the monitored event, whether triggered by anti-leak, anti-malware, or firewall functions, and enables you to quickly terminate the application causing the alert.
Outpost lists all software running on your system so you can quickly discover what’s happening on your computer or which application may be causing problems. Drill-down details of application activity are provided, including the program’s location, any data sent or received, and many other criteria.
Network activity monitoring
Outpost’s Network Activity Monitor shows every connection your PC makes with other computers on the Internet or local network, so you can see what’s happening on your PC at all times and quickly close down any unauthorized connections. The connections can be grouped/ungrouped according to application, and you can quickly edit any existing rules right from the interface.
Password-protection, multiple configuration profiles
You can set passwords to protect your configuration from accidental or deliberate modification, as well as create and use multiple configuration profiles to suit your current risk exposure. For advanced users, the ability to construct multiple restore points through the save/load configuration command is a big plus.
Manageable events logs
Outpost’s Log Viewer shows the event history on your computer, with support for per-category listings that can be sorted and filtered according to different user-specified criteria.
Driver certification and 64-bit systems support
Outpost Security Suite has received WHQL (Windows Hardware Quality Labs) certification, meaning that its protection complies with Microsoft’s stringent quality, compatibility and stability requirements. Its support for 64-bit implementation of Windows will benefit users of high-end computer systems, enthusiasts, developers, and game fans.
Windows 7 support Improved!
Outpost supports all popular versions of Windows, from Windows XP to the multiple varieties of Windows 7.
The new network connection protocol introduced in Windows Vista, IPv6, is fully recognized, filtered and its data protected. The protocol evolved from its predecessor, IPv4, and provides a number of scalability, automation and security improvements.
Adaptive firewall rules
When traveling with your laptop, or changing ISP, there’s no need to manually adjust your security for every new connection settings — Outpost handles it automatically by designating connection-specific parameters such as DNS or gateway server addresses as environment variables.
Entertainment mode for uninterrupted gameplay and video viewing
While you play full-screen games or watch videos on your PC, Outpost’s Entertainment Mode ensures the program won’t interrupt you with alerts if it detects new activity. New activity notifications are handled in the background without sacrificing current protection levels. You can customize which applications will automatically trigger the switch to Entertainment Mode.
Convenience and Ease of Use
Rules for most programs that access the Internet are applied automatically, relieving you of the need to enter rules manually every time a new application accesses the Internet or interacts with another program. This means that for most of the time, you won’t need to deal with questions relating to Internet access, minimizing interruptions and risk exposure due to insecure configurations. Outpost includes a wide range of predefined access policies; these settings can be customized to your individual requirements at any time.
ImproveNet delivers more ready-made configurations
ImproveNet is a voluntary system of program configuration aggregation and distribution from our user community. After being reviewed by Agnitum engineers, approved rulesets submitted by Outpost users are distributed across all our users, providing you with the most secure and up-to-date rules for a wide range of activities and applications.
SmartAdvisor — instant, context-sensitive help
If ImproveNet doesn’t have the answer, SmartAdvisor is always on hand to help you make the right decision when configuring access information for an application.
Whenever an anti malware update to Outpost Security Suite Pro is released, the- update module automatically retrieves the latest version from the Agnitum server and applies it as soon as you authorize it to do so.
New! Whenever updates to the main anti-malware engine become available, they will be automatically applied without the need for user participation (excepting, of course, for any required system reboot). This ensures the latest protection is always in place.
When your system has been configured in a secure manner and you’re sure (or your trusted computing advisor is sure) that all normal computer activity is safe and benign, you can activate the "autolearn" mode, which will suppress all security alerts and notifications. During this time, the program is silently learning what constitutes safe usage behavior and typical tasks and policies, and will apply this knowledge in the future to display fewer alerts when Outpost is switched back to normal mode.
Supported platforms: 32- and 64-bit Windows (Windows 7, Vista, Windows XP SP2+, Windows Server 2003 SP1+, 2008).
Supported email clients for anti-spam: The Bat!, Windows Mail, Outlook Express, Outlook (all versions).
Supported email protocols & services: POP3, SMTP, IMAP.
Minimum hardware requirements: 450 MHz CPU(x86-/x64-/multicore), 256MB RAM, 400MB free disk space.