Quick Heal

Quick Heal offers specialized security solutions designed for personal use on individual machines for home users. These products combine high performance with exceptional ease of use and outstanding design.

We at Comprompt Solutions provide Quick Heal Antivirus Installation, Quick Heal Antivirus Implementation, Quick Heal Antivirus Troubleshooting, Quick Heal Antivirus Maintenance, Quick Heal Antivirus Remote Support, Quick Heal Antivirus Service, Quick Heal Antivirus RMA, Quick Heal Antivirus Replacement, Quick Heal Antivirus Update and Quick Heal Antivirus Upgrade.

We are Mumbai based Quick Heal Dealer. We offer best suitable product and solution With best prices for your Home, Business,Enterprise.To know more about our antivirus solutions contact us.

Quick heal products

For Home Users

Quick Heal Total Security 2013

Features

comprompt-software-antivirus-quick-heal-total-security-2013Core Protection
Assures complete protection for your PC with a deep system scan through AntiVirus, AntiSpyware, AntiMalware, AntiRootkit, Silent Firewall and IDS/IPS.

Web Security
Real time cloud-based security protection restricts access to malware infected, fraudulent and phishing websites.

Browser Sandbox
Running your web browser in a browser sandbox gives you an uninterrupted and secure browsing experience. Acting like a screen between your PC’s operating system and the malicious threats it limits the attack surface.

Data Theft Protection
Prevents unauthorized copying of data using flash drives.

Parental Control
Schedule, control and monitor Internet usage for your children. Configure parental control based on user accounts.

Email Security
Cloud-based email security prevents spam, phishing and infected emails from reaching your inbox.

Privacy Protection
Securely deletes sensitive data files to prevent recovery by any recovery tools.

PC2Mobile Scan
Scans and cleans mobile phones, Smartphones and PDA’s from your PC.

PCTuner
Speed up the performance of your PC by tuning start-up applications, services and cleaning unwanted registry entries and files.

USB Drive Protection
Automatically scans external storage devices. Protects USB drives from autorun infections.

Silent Mode
Suppresses prompts across all Quick Heal modules thereby reducing system load and allowing uninterrupted PC usage.

Quick Heal Internet Security 2013

comprompt-software-antivirus-quick-heal-internet-securityCore Protection
Multi-layered protection for your PC through AntiVirus, AntiSpyware, AntiMalware, AntiRootkit, Silent Firewall and IDS/IPS.

Web Security
Real-time cloud-based security protection restricts access to malware infected, fraudulent and phishing websites. Prevents threats transferred through websites hosting malicious codes as you surf the Internet.

Browser Sandbox
Running your web browser in Sandbox Browser gives you an uninterrupted and secure browsing experience. Acting like a screen between your PC’s operating system and the malicious threats, it limits the attack surface.

Parental Control
Schedule, control and monitor Internet usage for your children. Configure parental control based on user accounts.

Email Security
Cloud-based email security prevents spam, phishing and infected emails from reaching your Inbox.

USB Drive Protection
Automatically scans external storage devices. Protects USB drives from autorun infections.

Silent Mode
Suppresses prompts across all Quick Heal modules thereby reducing system load and allowing uninterrupted PC usage.

Quick Heal Antivirus pro 2013

comprompt-software-antivirus-quick-heal-antivirus-proCore Protection
Effectively detects and resolves threats (viruses, worms and other malware) through AntiVirus, AntiSpyware, AntiMalware, AntiRootkit, Silent Firewall and IDS/IPS.

Web Protection
Real time cloud security protection restricts access to malware infected websites. Prevents threats transferred through websites hosting malicious codes as you surf the internet.

Browser Sandbox
Running your web browser in Sandbox Browser gives you an uninterrupted and secure browsing experience. Acting like a screen between your PC’s operating system and the malicious threats, it limits the attack surface.

USB Drive Protection
Automatically scans external storage devices. Protects USB drives from autorun infections.

Email Security
Cloud-based email security prevents, phishing and infected emails from reaching your Inbox.

Silent Mode
Suppresses prompts across all Quick Heal modules thereby reducing system load and allowing uninterrupted PC usage.

Quick Heal Total Security For Mac

comprompt-software-antivirus-quick-heal-total-security-for-macComplete Mac Security
Multi-layered and customizable virus protection continuously keeps your Mac safe from worms, Trojans and other malicious programs without slowing it down. Allows you to exclude files and folders from scanning and choose between a comprehensive full-system or selective scan options. Allows you to quarantine suspected files and have a backup of files before repairing them.

Web Security
Cloud based security restricts fake and fraudulent phishing websites from stealing identifiable information and money. Prevents the user from visiting fraudulent, compromised, infected and phishing websites automatically.

Parental Control
Gives you the power to change, schedule and control internet security settings for your kids. Parents can block access to categories of websites (e.g. Adult, Gaming, Social Networking, etc.) and protect children from online threats.

AntiSpam and Email Security
Real-time cloud based email security prevents spam, phishing and infected emails from reaching your inbox.

Quick Heal Total Security for Android

Virus Protection
Secures the file system of your mobile device from malicious threats. It remains active in the operating memory of the device and scans all files that are open, or saved including those on the memory card.Device Scanning
Helps detect any malicious object on your device and counter it. A regular scan helps in keeping your device safe from unseen threats.

Call Block
This feature enables you to block unwanted calls by creating a ‘Black List’ of numbers.

Event Log
Get extensive information of reports, data on blocked threats, updates etc.

Web Security
Blocks access to fraudulent websites that might phish your valuable information. Enable Parental Control to keep a tab on the mobile browsing activities of your children or others using your device.

Anti-Theft
Helps you track, lock or remotely render the mobile device useless in case of a loss or theft. You can also wipe selected data remotely by sending a predefined SMS.

SMS Block
Filter unwanted SMSs and block spam SMSs from unknown senders and easily configure Black list and White list.

Backup
Take a backup of your personal information such as contact numbers, text messages and calendar on the cloud and retrieve it whenever required.

Regular Automated Virus Updates
Takes automatic virus definition updates so that your device remains secure from real-time threats.

Quick Heal Mobile Security

comprompt-software-antivirus-quick-heal-mobile-securityVirus Protection
Assured protection from all kinds of malware threats. Automatic real-time virus and spyware scans with optional manual scan. Gives you the flexibility to use your mobile device without interruptions while scans run in the background.

Call Blocking
This feature enables you to block unwanted calls by creating a ‘Black List’ of numbers.

SMS Blocking
With this feature you can silently block unwanted SMSs. It also scans and filters embedded links in messages.

SMS Spam Protection
Filter unwanted SMSs and block spam SMSs from unknown senders and easily configure Black list and White list.

Anti-Theft
Helps you track, lock or remotely render the mobile device useless in case of a loss or theft. You can also wipe selected data remotely by sending a predefined SMS.

Detailed reports
Get extensive reports for all the above features.

Quick Heal Antivirus For Server

comprompt-software-antivirus-quick-heal-antivirus-for-serverEnhanced Graphical Dashboard
Advanced Graphical Dashboard gives immediate status of health of endpoints and highlights critical security situations that need immediate attention.

Easy deployment and maintenance

Multiple methods of deploying clients. Deployment methods include:

  • Synchronization with Active Directory – Easy and hassle free deployment with full active directory integration and synchronization support.
  • Disk Imaging – Creation of a disk image of Endpoint Security 5.0 client and deployment of it across the network.
  • Remote install – Installation via remote access of web console on any system in the network.
  • Login script setup – Assigning login script for installation.
  • Client Packager – Creation of client installer for manual set up.
  • Notify Install – Installation via email notification (containing URL) for endpoint client installation.

IDS/IPS
Advanced defense blocks malicious network activity and attempts to exploit software vulnerabilities of applications. Port scan attack prevention blocks intruder attempts aimed at open ports. DDOS attack prevention thwarts any Distributed Denial of Service attacks (DDOS) that might result in a Denial of Service (DOS).

Intelligent Firewall
Blocks unauthorized access to business network. Allows customization rules to be set to either low, medium or high based on observed network traffic. Admin can also configure exceptions for specific IP addresses or ports to be allowed or blocked.

Web Security
Blocks malware infected, phishing and malicious websites.

Web Filtering*
Allows blocking particular categories of websites (e.g. Social Networking, Games, etc.) or user-specified websites to limit web access and increase productivity.

Application Control*
Categories of applications can be either authorized or unauthorized from being executed in the network. This feature also gives the flexibility to add custom applications to existing blocked list.

Device Control*
Prevents threats from the use of unauthorized devices and media (DVDs, CDs and USB devices). Allows policies to be set to give read only or complete access to USB devices and block DVDs/CDs. This robust feature also prevents data leak by making USB devices accessible only on systems within the organization’s network.

Scan
This feature allows virus and malware scan of all networked computers from a central location. The scans can also be scheduled at a specific time.

Update
Networked computers can be updated from a central location. Endpoints can also be configured to take updates at a specified time.

Group Policy Management
Different user groups can be defined and policies can be set accordingly.

Email Scan*
Effectively scans your end-user inboxes for spam, phishing attacks and unsolicited e-mail messages. Allows White/black lists and self-learning to be set up separately for each user or group.

Multiple Update Managers
This feature allows deployment of multiple update managers across the network. This helps in load balancing and in avoiding network congestion that usually happens when there is a single update manager.

Email and SMS Notifications
This feature allows notifications to be sent to configured email addresses and numbers alerting them of critical network events.

Tuneup*
This feature helps to improve the performance of computer systems by cleaning junk and invalid registry/disk entries. Tuneups can be carried out for all endpoints from the Endpoint Security Server. It can also be scheduled at a specific time and date.

Reports
Provides a range of graphical and tabular reports, which can also be exported and saved in a variety of formats (e.g. PDF, CSV). Reporting can be scheduled according to the requirements. Automatic emails of reports can be sent to specific email addresses.

Quick Heal PCTuner 3.0

Auto Tuneup
Deletes invalid and unwanted junk files, obsolete registry entries, traces of Internet history and of daily used applications.

Disk Cleanup
Creates disk space and improves system performance by removing invalid and junk files from the hard disk.

Registry Cleanup
Removes invalid registry entries from the system that appear due to improper uninstallation, non-existent fonts, etc.

Traces Cleanup
Removes traces of browsing history from browsers like Internet Explorer, Chrome, Safari and Opera. Also erases traces from programs like MS Office, Adobe Acrobat Reader, Media player, WinZip, WinRAR, etc.

Duplicate File Finder
Deletes duplicate files of images, mp3/mp4 or other music files, movies, documents and many other popularly used files.

Restore
By default, a backup is taken whenever Disk Cleanup or Registry Cleanup is performed. This helps the user to restore earlier settings in case any change in system behavior is observed.

Defragmenter
Registry Defragmenter clubs all page-file fragments into one continuous chunk to improve the system performance.

Startup Booster
This feature removes all unwanted programs that run at startup and slow the system.

Secure Delete
Deletes the user specified files and folders permanently from the hard disk making it unrecoverable even by any Recovery Software. It provides three types of deletion methods.

Service Optimizer
Windows may be running potentially unwanted services that consume memory and slow down system performance at startup. Service optimizer helps to disable these unwanted services and improve system performance.

For Enterprise

Quick Heal Terminator

First line of defense for your Network

Quick Heal Terminator provides complete computer and network security with uninterrupted connectivity.

  • Power-packed gateway security solution that guards your company network against emerging threats.
  • Robust and fully integrated multi-layered network security that boosts your enterprise network’s productivity and efficiency.

Features

Firewall

Administrators can block or allow each protocol from accessing each internal network, user and user group thus providing overall company security and data security.

Gateway Antivirus

Adds an extra layer of protection to existing desktop antivirus solutions.

IPS/IDS
Provides data security by protecting network from mass attacks like DOS and DDOS, so that the network remains unaffected from remote and sync flood attacks.

Gateway Mail Protection

Scans inbound and outbound email messages and email attachments. In-built spam filter runs a series of tests on inbound email messages.

Load Balancing

Allows multiple ISPs to be used in a network simultaneously. This enables users to utilize the same gateway irrespective of the ISP lines by providing gateway security.

Automatic Link Failover

Automatically diverts the data traffic from inactive ISP to active ISP lines in case any of the ISP lines fail to perform.

Content Filtering

Enhanced web security that blocks Internet access to inappropriate or suspicious and unsafe Web sites.

VPN

Provides the IT administrators a means for secure communication with the company’s remote users and for building secure site-to-site connections.

Bandwidth Manager

Simplifies IT security management by allowing allocation of bandwidth. The allocation can be done on the basis of usage among users and user groups, thus saving bandwidth cost of the company.

IT Policy Management

Provides comprehensive logging and reporting with a user-friendly web-based configuration.

Benefits

Business Benefits

  • IT security management
  • Safe working environment
  • High productivity
  • Regulatory compliance
  • Cost-effective bundled solution

Financial Benefits

  • Consolidated cost-effective solution
  • Optimum use of IT resources

Technological Benefits

  • Cumulative network security
  • Plug-and-play solution
  • Extensive support for your Quick Heal Terminator

Quick Heal Endpoint Security 6.0

Device Control*

Controls and configures various device types for Windows and Mac platforms. Robust and flexible management options safeguard against unverified devices.

Data Loss Prevention

Stops data leakage by regulating transfer channels such as removable drives, network sharing, web apps and online services. Specific file types can be monitored and comprehensive reports can be scrutinized.

File Activity Monitor*

Provides a bird’s eye view of all actions against confidential files to safeguard confidential company data. When a specified file is copied, renamed or deleted, a notification is sent to the administrator.

Asset Management
Gives administrators comprehensive knowledge about the hardware and software configuration of every endpoint. Notifications are sent to configured email addresses whenever any alteration to the hardware on any system takes place.

New Dashboard

The updated graphical dashboard provides a hub to monitor overall network health, security status and compliance degree. Gives clear visibility and control with comprehensive reports so that critical actions can be taken.

License History

Provides an instant glimpse into product license history. Administrators can gather details such as license activation, reactivation, license renewal and additional feature pack details.

Redirection of Specific Groups/Clients

Seamlessly redirects specific endpoint groups/clients to different servers. Enterprises with large numbers of endpoints, or low bandwidth, can easily migrate clients to a new server.

IDS / IPS

Advanced defense mechanism to detect and prevent malicious network activity that attempts to exploit software vulnerabilities of applications. Port scan attack prevention blocks intruder attempts aimed at open ports. DDoS attack prevention thwarts any Distributed Denial of Service (DDoS) attacks that might result in the denial of service.

Intelligent Firewall

Blocks unauthorized access to business network. Allows customization rules to be set to Low, Medium or High based on observed network traffic. Administrators can also configure exceptions for specific IP addresses or ports to be allowed or blocked.

Easy Deployment and Maintenance

Clients can now be flexibly deployed by the following multiple methods:

  • Synchronization with Active Directory – Easy and hassle free deployment with full Active Directory integration and synchronization support.
  • Disk Imaging – Creation of a disk image of Endpoint Security 6.0 client and deployment of it across the network.
  • Remote Install – Installation via remote access of web console on any system in the network.
  • Login Script Setup – Assigning login script for installation.
  • Client Packager – Creation of client installer for manual setup.
  • Notify Install – Installation via email notification (containing URL) for endpoint clients.

Web Security

Blocks malware infected, phishing and malicious websites from affecting the endpoint clients within the network.

Web Filtering*

Allows the blocking of particular categories of websites (e.g. Social Networking, Games, etc.) or individual user-specified websites to limit web access and increase productivity.

Application Control*

Categories of applications can be either authorized or unauthorized from being executed within the network. This feature also gives the flexibility to add custom applications to an existing blocked list.

Scan

This feature scans all the networked computers for viruses and malware from a central location. Customizable scans can also be scheduled for a specific date or time.

Update

Networked computers can be updated from a central location. Endpoints can also be configured to take updates at a specified time.

Group Policy Management

Different user groups within the network can be defined and flexible policies can be set accordingly.

Email Scan*

Effectively scans your end user inboxes for spam, phishing attacks and unsolicited email messages. Allows whitelists or blacklists and self-learning to be set up separately for each user or group.

Multiple Update Managers

This feature allows multiple update managers to be deployed across the network. This helps in load balancing and in avoiding network congestion as is usually the case for a single update manager.

Email and SMS Notifications

This feature sends notifications to preconfigured email addresses and phone numbers, thus alerting them about critical network events.

Tuneup*

This feature enhances the performance of computer systems in the network by cleaning junk files and deleting invalid registry/disk entries. Tuneups can also be scheduled for a specific date and time.

Reports

Gives the ability to drill down from high level to more in-depth reports. Provides a range of graphical and tabular reports, which can also be exported and saved in a variety of formats (e.g. PDF, CSV). Reporting can also be scheduled according to specific requirements.

Vulnerability Scan

This feature scans known vulnerabilities of installed applications and operating systems in the network. It helps frame security measures against known vulnerabilities and protects against security breaches by threat agents.

Scans vulnerabilities in applications such as Adobe, Safari, Mozilla, Oracle, etc.

Sends notifications regarding unpatched operating systems working on computers within the network.

Quick Heal EPS Business 5.0 & Quick Heal EPS Total 5.0

Quick Heal EPS 5.0 require Internet Explore 7.0

New User Interface
We have introduced new user interface, where we get information in PIE chart of Device
Control, Web Security, Update Status, Virus Detected & Application Control on Dashboard.

New Client Deployment Method

Now Quick Heal client has it’s own unique GUID.

Active Directory Support
We have introduced new client deployment method ie Installation through active
directory. It gets sync with Active directory container like user & groups. We can exclude clients to be installed by ip address or ip address range also.

Disk Image

Firewall
We have introduced centralized & customized firewall, where administrator can create it’s
own inbound & outbound rules. We work on TCP/UDP /ICMP protocols & supports IP V4.

We have 4 types of level in Firewall

  • Low
  • Medium
  • High
  • Block All

By default we set our firewall on LOW level

Device Control
In device control, we support only USB removable drive ( Not mass storage like external HDD). We need to register each & every pen drive to access & accordingly we can apply policy like read & read-write. Suppose if pen drive is not registered, then it won’t get detected.
We have introduced device encryption feature, which will encrypt data in removable drive.
To decrypt data, user need to connect pen drive to the Quick Heal’s EPS client.

Web Security
We have customized web security feature. Now we can exclude web sites from Browsing protection

Web Filtering
We have introduced centralized web content filtering. In this feature we haven’t provided internet access scheduling feature like stand alone.

Application Control
We have introduced centralized application control feature, which works on online protection. We have categorized applications & we can add applications as per administrator requirement.

IDS/IPS
We have introduced IDS/IPS. At client side we get enable/disable option for IDS/IPS.

Port Scanning
In 600 mili seconds, if 6 or more ports are scanned on particular system, then ip address of attacker will get blocked.

DDOS Attack (Denial of service)
In 600 mili seconds, if particular system’s service is flooded by 256 or more ip address, then 257th ip & next to 257th ip addresses will be blocked.

Centralized Tune-Up

Added centralized tune up in EPS. For tune-up, user must be logged in. In Tune-up,we have DISK Cleaner/REGISTRY Cleaner & Defragment. Recycle Bin & empty folder is not included in Disk Cleanup. There is no backup.

Centralized Anti-Malware Scanning
Added Anti malware centralized. Only critical threat will be cleaned.

Spam Security
We have added one more category in spam protection

  • Soft :- Mails which are confirmed spam
  • Moderate :- Mails which are confirmed spam + bulk mail
  • Strick :- Mails which are confirmed spam + bulk mail + words

Update Manager Enhancement & update Schedule

Update manager is service based. Update manager will take updates even not logged in. We can install standalone multiple update manager & clients will take updates from applied update manager but if that update manager system gets down, then client will take updates from another update manager as per priority set. Update schedule option is given at client side & it works on 24 hours basis.

Email & SMS notification

We need to configure EMAIL notification. It will send mail on every day 8.00 AM.
Virus detected:- Email
Virus found in active memory:- Email & SMS
Virus Outbreak:- Email & SMS

Reports

Reports can be found for 180 days. It can be exported in to CVS & PDF format.

Reports will be generated for below modules:-

  • Virus Scan
  • Anti Malware Scan
  • Web Security
  • Tune Up
  • Device Control
  • Application Control
  • IDS/IPS
  • Firewall

Quick Heal AntiVirus for Server

Optimized antivirus scanning engine
Detects viruses before the system is infected. It is light on server resources resulting in faster server performance.

Virus Protection
Prevents virus attacks on your server by continuously monitoring and blocking virus infection.

Data Theft Protection
Data on server is valuable and often vulnerable to theft. This feature blocks access to removable drives (USB drives, Pen Drives, Memory cards, etc.) thereby blocking to-and-fro transfer of data from the server to these drives.

AntiSpam
The powerful filtering engine identifies and filters junk and unwanted emails as Spam.

Email Protection
Since email is most widely used for communication, newer virus use email as a medium to spread. The Mail Protection feature has been redesigned to provide an effective counter measure against threats to servers.

Browsing Protection
This new feature from Quick Heal enables you to monitor and filter all HTTP traffic coming from Web sites on the Internet. It is browser independent and has little/no impact on browsing speed.

USB Drive Protection
The autorun feature of removable devices is one of the ways through which malware is spread. This feature secures removable devices (Pen Drives, Memory cards, etc.) and prevents spread of infection through autorun malware

Firewall Protection
This feature works silently in the background and monitors network activity for malicious behavior to ensure the elimination of malware before they can reach the system.

Autorun Protection
Blocks Autorun malwares from entering the server by disabling the Autorun feature of the server.

AntiSpyware, AntiMalware and AntiRootkit
Comprehensive protection against spyware, malwares and rootkits.

Quick Heal Exchange Protection

For Exchange 2000/2003

DNA Scan
Detects new and unknown viruses. Detects and cleans viruses, worms, Trojans and all kinds of malware. The improved technology also scans file and archive attachments (ZIP, ARJ, GZIP, RAR, TAR, CAB etc).

Store Scan
Allows you to schedule on-demand scanning for all or specific user mailboxes and public folders. This can also be performed for mailbox and store attachments that violate corporate policy.

Back Scan
Saves time and reduces workload by prompting an automatic scan of mail stores after every successful update.

Powerful Spam filters
Intelligent technology carries out real-time scans for spam messages and attachments. Automatically blocks malicious emails like IFRAME Exploit emails.

White and Blacklists
Personal and global black lists and white lists can be maintained to restrict email communication from senders that are known to be malicious.

Centralized management
Allows flexible and easy management via web-based console that gives system administrators quick response time and consolidated event status. Remote administration allows companies to react to threats in real time as soon as they arise.

Multi-functionality dashboard
The dashboard is easily accessible and its simple interface allows the administrator to view various indicators simultaneously. In case there are any threats detected, this is informed to the administrator via highly visible alerts.

Personalized and versatile reports
Timely and detailed reports can be obtained in the format and at the frequency desired.

Export configurations with ease
Administrative settings for the application can be configured based on prevalent company IT policies and regulations.

For Exchange 2007/2010

Virus Scan
The robust virus scanning engine of Quick Heal Exchange Protection detects viruses and other infections. For improved virus identification, scanning may be initiated at any of the following three levels: Real Time Scan, Hub Transport Scan, and Edge Transport Scan.

AntiSpam
This feature provides the facility to set AntiSpam rules for all inbound and outbound emails. Rules can be set as per the requirement or according to the types of spam emails received.

Content Filtering
Filters emails based on various criteria such as sender or sender’s domain, keywords in the subject line, file type and file name and words or phrases in the body text. This results in an effective identification and filtering of every suspicious email.

Schedule Scan
Defining a scan schedule allows mailboxes and public folders to be scanned automatically at the programmed time. Multiple schedules can be defined so that the scanning is initiated at your convenience. Additionally, your mailbox can be scanned manually through a Store Scan.

Notification
The intuitive software notifies the administrators regularly on virus infections and policy breaches in the emails. Notifications are alerts on important system events such as license expiry, change of password and so on, so that appropriate actions can be taken on time to avoid any mishap.

Reports
This feature provides an in depth view of all actions and events taken by the software. It also provides the option to save and download reports for future reference and analysis.

Quarantine
Quarantine folder stores emails which breach any policy for e.g. virus and spam email detections or any content filtering criteria being met.

Quick Heal Mail for windows

Powerful platform independent scan engine

The advanced scan engine resolves all compatibility and detection problems with its more powerful and scalable technology, regardless of the system the virus is stored in or made for.

Robust anti-spam engine

Powerful spam filters ensure that fewer spam emails get through the email system. This helps prevent businesses from zero-day spam attacks and outbursts.

Black and White lists for email communication

Personal and Global black lists and white lists can be maintained to restrict or allow email communication from senders that are known to be either malicious or genuine. These lists can be incorporated either on server-wide basis or to machines on individual basis.

Effective attachment filters

Outgoing and incoming attachments are persistently scanned to detect any prevalent threats or files that could violate copyright policies or lead to data theft or company liability. Details significant to the attachment size, nature and content are scanned actively.

Automatic Updates

Quick Heal Mail Protection can be configured to upgrade the scan engine automatically.

Simple deployment and maintenance

Web-based user interface makes configuration and monitoring of the protection from any platform workstation. Allows users to set up personal blacklists and whitelists and manage their own quarantined items.

Easy Integration

Designed to be a mail agent independent product for the Windows range of mail servers, the security solution is simple to install and easy to use.

Flexible reporting and log distribution

The dashboard provides a unified platform for threat reports and notifications. These reports can be customized extensively based on past incidents to inform system administrators as well as document owners about active threats

Quick Heal Mail for Linux

Powerful platform independent scan engine

The advanced scan engine resolves all compatibility and detection problems with its more powerful and scalable technology, regardless of the system the virus is stored in or made for.

Robust anti-spam engine

Powerful spam filters ensure that fewer spam emails get through the email system. This helps prevent businesses from zero-day spam attacks and outbursts.

Black and White lists for email communication

Personal and Global black lists and white lists can be maintained to restrict or allow email communication from senders that are known to be either malicious or genuine.

Effective attachment filters

Outgoing and incoming attachments are persistently scanned to detect any prevalent threats or files that could violate copyright policies or lead to data theft or company liability. Details significant to the attachment size, nature and content are scanned actively.

Automatic Updates

Quick Heal Mail Protection can be configured to upgrade the scan engine automatically.

Simple deployment and maintenance

Web-based user interface makes configuration and monitoring of the protection from any platform workstation.

Easy Integration

Simple to install and easy to use. Quick Heal Mail Protection for Linux can be easily integrated with popular Linux-based Mail Transfer Agents (MTAs) like Sendmail, Qmail, Postfix, Exim, PostMaster etc.

Flexible report and log distribution

The dashboard provides a unified platform for threat reports and notifications. These reports can be customized extensively based on past incidents to inform system administrators as well as document owners about active threats.

Quick Heal for Linux

Powerful Scanners

The inbuilt GUI and Command Line scanners hunt archives and packed files for possible threats. They also detect and remove polymorphic viruses.

  • GUI Scanner – Easily configurable from user interface (GUI). You can also configure to update Quick Heal Antivirus automatically using GUI Scanner. It can also scan files using the dumb method.
  • Command Line Scanner – Configure the feature to systematically scan for viruses and set appropriate action items using various commands. However, it is important to ensure that you have selected logical commands even in commands like ‘Delete’. In case files are not repairable, they will be deleted using this combination. Therefore, it is recommended to keep a backup of your data before initiating scan.

Real-time protection

Detects and automatically cleans thousands of viruses, worms, backdoor, Trojans, spyware, adware, riskware, dialers, jokes and DDOS tools.

Online Protection

Scans files when they are executed, accessed or closed using Quick Heal Real Time protection based on Dazuko

Reference – http://www.quickheal.com