Feeds

Prevx releases free intrusion prevention software

Closing the window of exposure

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Update Security developer Prevx today released a free version of its host-based intrusion prevention software. It aims to offer consumers protection from new, unknown or zero-day threats. Prevx Home is designed to close the security gap that exists between when a fast spreading internet worm is released and when updated signatures from AV vendors become available.

Host-based intrusion prevention software has risen to prominence over recent months as vendors such as Cisco, McAfee have sought to apply behaviour blocking techniques as a supplement to conventional AV scanner software. Thus far this has been a corporate play. Prevx Home is the first host-based intrusion prevention product to be offered as a free download, following a model adopted by GRISoft and Spybot in the AV and anti-spyware markets, respectively.

The official launch of Prevx Home follows two months of beta testing, during which tens of thousands of home users have downloaded and tested the software. The application is based on technology developed by Prevx for its enterprise intrusion prevention product. Prevx Home detects and block the behaviour displayed by malicious attacks without relying on signature updates. Prevx Home is designed to protect users against internet worms, Trojans, automated hacking tools and covert spyware.

Nick Ray, chief exec of Prevx, said the company is talking to number of ISPs which wish to make Prevx Home available to their broadband and dial-up customers. For now, users can download Prevx Home (registration required) here. ®

Related stories

Network Associates warms to behaviour blocking
SecureWave revamps alternative to desktop AV
Windows worms tax ISPs
Virus writers outpace traditional AV
The trouble with anti-virus

Secure remote control for conventional and virtual desktops

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Choosing a cloud hosting partner with confidence
Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.