The Network Box Anti-Malware system provides 16 anti-malware engines, running over 12 million signatures, to identify and prevent viruses, trojans, worms and other malicious software, from infecting your networked systems or networked smart devices.
Additionally, the anti-malware system transparently scans and analyzes incoming and outgoing SMTP emails, HTTP and FTP protocols for malware. Even attachments such as .exe, .zip files, and other compression and encoding formats are decoded and scanned. Furthermore, external emails from POP3 and IMAP accounts are also scanned to ensure your network is secured.
The malware signature database that powers the anti-malware system is updated in real-time, using Network Box's patented PUSH Technology.
Crypto Hash Checks
Compares each object in the message with a database of malicious object signatures.
Regular Expression Checks
Uses regular expressions to look for common malicious code structures.
Looks for illegal structures and formatting in MIME email messages.
Kaspersky Message Scanner
Used to run the Kaspersky AVP anti-virus scanner against the entire message.
Kaspersky Object Scanner
Used to run the Kaspersky AVP anti-virus scanner against unpacked objects found inside the email message.
Clam Object Scanner
Used to optionally run the Clam anti-virus scanner against unpacked objects found inside the email message.
Bagle Variant Heuristics
Used to block new, emerging, variants of the Bagle family of viruses.
Hidden Executable Heuristics
Used to determine if executable code is hiding in non-executable file extensions.
Class ID Heuristics
Checks CLASSID extensions in attached files, as this is a common technique used to bypass anti-virus scanning, or exploit mail reader vulnerabilities.
Blank Extension Heuristics
Checks file extensions, looking for certain types of blank extension commonly used to bypass anti-virus scanning, or exploit mail reader vulnerabilities.
Multiple Extension Heuristics
Checks for certain classes of multiple extensions, commonly used to bypass anti-virus scanning, or exploit mail reader vulnerabilities.
An in-the-cloud defense shield that provides fast and effective protection against emerging zero-day malware.
12,000,000+ Malware Signatures*
Triple 100% Tolly Group detection rating against their Extended Wildlist Malware database over HTTP, SMTP and POP3 protocols.
Anti-mobile malware protection.
*For more information and real-time statistics: