Compare Emsisoft protection plans
Anti-Malware Home | Business Security | Enterprise Security + EDR | |
---|---|---|---|
Finding and removing malware | |||
Dual-engine virus and malware detection | |||
Super fast system scans (1-2 min) | |||
PUP/unwanted programs detection | |||
Advanced infection cleaning | |||
Safe quarantine of suspicious files | |||
Scan exclusions/allow list | |||
Scheduled scans | |||
Windows Explorer integration | |||
Command line interface included | |||
Emergency Kit maker included | |||
Preventing new infections | |||
Multi-layered real-time protection | |||
Web Protection | |||
Anti-phishing | |||
Browser security | |||
File Guard | |||
Behavior Blocker | |||
Anti-Ransomware | |||
Exploit prevention | |||
System manipulation prevention | |||
Application hardening | |||
Advanced Persistent Threat (APT) protection | |||
Fileless malware protection | |||
Targeted attack prevention | |||
Botnet protection | |||
False positives verification | |||
Protection exclusions/allow list | |||
Hourly automatic updates | |||
Emergency network lockdown mode | |||
Shutdown & uninstall prevention via password | |||
Windows Firewall monitoring and hardening | |||
Windows RDP attack detection | |||
Endpoint detection and response (EDR) | |||
Suspicious behavior monitoring | On endpoint only | On endpoint and in cloud. High-confidence events only | On endpoint and in cloud. All confidence levels events |
Incidents retention time | 365 days | 365 days | |
Raw log data retention time | 0 days | 30 days | |
Local detections on devices | |||
Quick allow/quarantine/block everywhere | |||
Device isolation | |||
Execution tree & timeline | |||
MITRE ATT&CK tactics & techniques | |||
Deep threat insights | |||
Rollback | |||
Workspace-wide threat hunting | |||
Endpoint visibility with OSQuery | |||
SOC/SIEM integration via Syslog | |||
Centralized management | |||
Management Console included | Simplified | Fully featured | Fully featured |
Industry leading mirror view | |||
Web access & mobile app | |||
“Local only” management mode | |||
“Local & remote” management mode | |||
“Remote only” management mode | |||
Traffic caching relay devices (multiple) | |||
Incident investigation tools | |||
Forensics & audit logs | |||
Remote scans & quarantine | |||
Device isolation | |||
Device health & system overview | |||
Email, webhook & push notifications | |||
Advanced reporting | |||
Logs and reports retention time | 30 days | 180 days | 365 days |
Protection policies for device groups | |||
| |||
| |||
Maximum protection policies | 10 | 10 | Unlimited |
| 10 | 10 | Unlimited |
Maximum workspace managers | 2 | 2 | Unlimited |
Invite Emsisoft partners (MSPs) to manage workspace | |||
REST Web API for all features | |||
Task automation & Windows Server features | |||
Scheduled scans | |||
Command line interface included | |||
Email notifications for relevant events | |||
Monitoring of file shares and connected storage | |||
Protection without logged in users | |||
Silent mode/gaming mode | |||
Windows Server OS supported | |||
Active Directory integration | |||
Automatic detection of new devices | |||
Remote deployment through relay devices | |||
Dedicated Emsisoft benefits | |||
Money back guarantee | |||
Malware removal assistance | |||
Always get the latest version | |||
Certified protection | |||
Privacy conscious design | |||
Email & live chat support | |||
Skip-the-line priority support | |||
Call-back service (8am-9pm ET) | |||
| See details | See details | See details |