fbpx
0

[av_section min_height=” min_height_px=’500px’ padding=’small’ shadow=’no-border-styling’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=” bottom_border_style=” id=” color=’main_color’ custom_bg=” src=’https://thymeit.co.za/wp-content/uploads/2016/05/header2-apple-2000-x-1200-1500×900.jpg’ attachment=’422′ attachment_size=’extra_large’ attach=’fixed’ position=’bottom center’ repeat=’no-repeat’ video=” video_ratio=’16:9′ overlay_enable=’aviaTBoverlay_enable’ overlay_opacity=’0.9′ overlay_color=’#3a3a3a’ overlay_pattern=” overlay_custom_pattern=” av_element_hidden_in_editor=’0′]
[av_heading heading=’Managed Anti-Virus’ tag=’h1′ style=’blockquote modern-quote modern-centered’ size=’42’ subheading_active=” subheading_size=’15’ padding=’10’ color=’custom-color-heading’ custom_font=’#ffffff’ admin_preview_bg=”][/av_heading]

[av_textblock size=’20’ font_color=’custom’ color=’#ffffff’ admin_preview_bg=”]

New ransomware variants and other zero-day threats routinely bypass traditional anti-virus and anti-malware security.

[/av_textblock]

[av_one_third first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_display=”]

[av_icon_box position=’top’ icon_style=’av-icon-style-no-border’ boxed=’av-no-box’ icon=’ue826′ font=’entypo-fontello’ title=’Avoid losing data and confidential information’ link=” linktarget=” linkelement=” font_color=’custom’ custom_title=’#ffffff’ custom_content=’#ffffff’ color=’custom’ custom_bg=’#ffffff’ custom_font=’#4a9dd4′ custom_border=’#4a9dd4′ admin_preview_bg=’rgb(34, 34, 34)’]
Block hackers from trying to steal sensitive records or employee information.

 
[/av_icon_box]

[/av_one_third][av_one_third min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_display=”]

[av_icon_box position=’top’ icon_style=’av-icon-style-no-border’ boxed=’av-no-box’ icon=’ue8d7′ font=’entypo-fontello’ title=’Two-way firewall with Intrusion Detection and Prevention’ link=” linktarget=” linkelement=” font_color=’custom’ custom_title=’#ffffff’ custom_content=’#ffffff’ color=’custom’ custom_bg=’#ffffff’ custom_font=’#4a9dd4′ custom_border=’#4a9dd4′ admin_preview_bg=’rgb(34, 34, 34)’]
The fully-featured two way personal firewall with Intrusion Detection is essential in blocking intrusion and hijack attempts.

 
[/av_icon_box]

[/av_one_third][av_one_third min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_display=”]

[av_icon_box position=’top’ icon_style=’av-icon-style-no-border’ boxed=’av-no-box’ icon=’ue80b’ font=’entypo-fontello’ title=’Enhance your business productivity’ link=” linktarget=” linkelement=” font_color=’custom’ custom_title=’#ffffff’ custom_content=’#ffffff’ color=’custom’ custom_bg=’#ffffff’ custom_font=’#4a9dd4′ custom_border=’#4a9dd4′ admin_preview_bg=”]
Control employee access to certain websites or applications.

 
[/av_icon_box]

[/av_one_third]
[/av_section]

[av_section min_height=” min_height_px=’500px’ padding=’no-padding’ shadow=’no-border-styling’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=” bottom_border_style=” id=” color=’main_color’ custom_bg=” src=’https://thymeit.co.za/wp-content/uploads/2016/05/header2-apple-2000-x-1200-1500×900.jpg’ attachment=’422′ attachment_size=’extra_large’ attach=’fixed’ position=’bottom center’ repeat=’no-repeat’ video=” video_ratio=’16:9′ overlay_enable=’aviaTBoverlay_enable’ overlay_opacity=’0.9′ overlay_color=’#323044′ overlay_pattern=” overlay_custom_pattern=” av_element_hidden_in_editor=’0′]
[av_hr class=’default’ height=’50’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′]

[av_heading tag=’h1′ padding=’5′ heading=’Signup now for a free 30-day Managed Anti-Virus trial’ color=’custom-color-heading’ style=’blockquote modern-quote modern-centered’ custom_font=’#ffffff’ size=’40’ subheading_active=” subheading_size=’15’ custom_class=” admin_preview_bg=’rgb(34, 34, 34)’][/av_heading]

[av_hr class=’default’ height=’50’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′]

[av_one_half first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_display=”]

[av_contact email=’itadmin@thymetech.co.za’ title=” button=’Sign up’ on_send=” sent=’Thank you for your enquiry. You will receive an email shortly finalising and activating your free 30-day Managed Anti Virus trial.’ link=’manually,http://’ subject=” autorespond=” captcha=” form_align=” color=” admin_preview_bg=’rgb(34, 34, 34)’]
[av_contact_field label=’Name’ type=’text’ check=’is_empty’ options=” multi_select=” av_contact_preselect=” width=”][/av_contact_field]
[av_contact_field label=’E-Mail’ type=’text’ check=’is_email’ options=” multi_select=” av_contact_preselect=” width=”][/av_contact_field]
[av_contact_field label=’Company Name (optional)’ type=’text’ options=” check=” width=” multi_select=” av_contact_preselect=”][/av_contact_field]
[av_contact_field label=’Number of Managed Anti Virus Licenses required’ type=’text’ options=” check=’is_number’ width=” multi_select=” av_contact_preselect=”][/av_contact_field]
[/av_contact]

[/av_one_half][av_one_half min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_display=”]

[av_hr class=’short’ height=’50’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′ font=’entypo-fontello’ admin_preview_bg=”]

[av_textblock size=’20’ font_color=’custom’ color=’#ffffff’ admin_preview_bg=”]

Using advanced behavior-based technologies, AV Defender with the engine power of Bitdefender  detected 99% of unknown threats in independent trials.

AV Defender also has two additional anti-ransomware defense layers – a blacklist of 2.8 million samples and rising, and a vaccine that can immunize devices against the encryption process.

[/av_textblock]

[av_hr class=’short’ height=’50’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′ font=’entypo-fontello’ admin_preview_bg=”]

[/av_one_half]
[/av_section]

[av_section min_height=” min_height_px=’500px’ padding=’default’ shadow=’no-shadow’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=” bottom_border_style=” id=” color=’main_color’ custom_bg=” src=’https://thymeit.co.za/wp-content/uploads/2016/05/header2-apple-2000-x-1200-1500×900.jpg’ attachment=’422′ attachment_size=’extra_large’ attach=’fixed’ position=’bottom center’ repeat=’no-repeat’ video=” video_ratio=’16:9′ overlay_enable=’aviaTBoverlay_enable’ overlay_opacity=’0.9′ overlay_color=’#3a3a3a’ overlay_pattern=” overlay_custom_pattern=” av_element_hidden_in_editor=’0′]

[av_one_half first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_display=”]

[av_iconlist position=’left’ iconlist_styling=” custom_title_size=” custom_content_size=” font_color=’custom’ custom_title=’#ffffff’ custom_content=’#eeee22′ color=’custom’ custom_bg=’#4a9dd4′ custom_font=” custom_border=” admin_preview_bg=’rgb(34, 34, 34)’]
[av_iconlist_item title=’Antivirus and anti-malware’ link=” linktarget=” linkelement=” icon=’ue812′ font=’entypo-fontello’]
Antivirus and anti-malware signatures, heuristics, continuous process monitoring and a global threat intelligence network.
[/av_iconlist_item]
[av_iconlist_item title=’Two-way firewall with Intrusion Detection/Prevention’ link=” linktarget=” linkelement=” icon=’ue812′ font=’entypo-fontello’]
The fully-featured two way personal firewall with Intrusion Detection is essential in blocking intrusion and hijack attempts.
[/av_iconlist_item]
[av_iconlist_item title=’Search Advisor and Web filtering’ link=” linktarget=” linkelement=” icon=’ue812′ font=’entypo-fontello’]
Potentially harmful websites are marked in the search results and known malicious pages are blocked.
[/av_iconlist_item]
[av_iconlist_item title=’Data protection’ link=” linktarget=” linkelement=” icon=’ue812′ font=’entypo-fontello’]
Prevent the loss of confidential data by setting filters that will block the transmission of sensitive information.
[/av_iconlist_item]
[av_iconlist_item title=’Remote and local quarantine management’ link=” linktarget=” linkelement=” icon=’ue812′ font=’entypo-fontello’]
The quarantine is stored locally but can be managed centrally from the control console.
[/av_iconlist_item]
[/av_iconlist]

[/av_one_half][av_one_half min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_display=”]

[av_iconlist position=’left’ iconlist_styling=” custom_title_size=” custom_content_size=” font_color=’custom’ custom_title=’#ffffff’ custom_content=’#eeee22′ color=’custom’ custom_bg=’#4a9dd4′ custom_font=” custom_border=” admin_preview_bg=’rgb(34, 34, 34)’]
[av_iconlist_item title=’User web and application control’ link=” linktarget=” linkelement=” icon=’ue812′ font=’entypo-fontello’]
Restrict or block employee access to applications or web pages.
[/av_iconlist_item]
[av_iconlist_item title=’Device Control and USB scanning’ link=” linktarget=” linkelement=” icon=’ue812′ font=’entypo-fontello’]
Minimize risks of infections and data loss with automatic USB scanning and device control.
[/av_iconlist_item]
[av_iconlist_item title=’Monitoring Dashboard and reports’ link=” linktarget=” linkelement=” icon=’ue812′ font=’entypo-fontello’]
Centrally monitor the security posture of the organization using on-demand or scheduled reports.
[/av_iconlist_item]
[av_iconlist_item title=’Role-based user model’ link=” linktarget=” linkelement=” icon=’ue812′ font=’entypo-fontello’]
Internal accounts with different access privileges can be created in the management console.
[/av_iconlist_item]
[av_iconlist_item title=’User-aware policies (on-premise console)’ link=” linktarget=” linkelement=” icon=’ue812′ font=’entypo-fontello’]
Different security policies can be adapted based on employee roles in the company, they are available when there is an Active Directory integration and are applied when the user logs in.
[/av_iconlist_item]
[/av_iconlist]

[/av_one_half][/av_section]