Compare Emsisoft protection plans
| Anti-Malware Home | Business Security | Enterprise Security + EDR | |
|---|---|---|---|
| Finding and removing malware | |||
| Dual-engine virus and malware detection | |||
| Super fast system scans (1-2 min) | |||
| PUP/unwanted programs detection | |||
| Advanced infection cleaning | |||
| Safe quarantine of suspicious files | |||
| Scan exclusions/allow list | |||
| Scheduled scans | |||
| Windows Explorer integration | |||
| Command line interface included | |||
| Emergency Kit maker included | |||
| Preventing new infections | |||
| Multi-layered real-time protection | |||
| Web Protection | |||
| Anti-phishing | |||
| Browser security | |||
| File Guard | |||
| Behavior Blocker | |||
| Anti-Ransomware | |||
| Exploit prevention | |||
| System manipulation prevention | |||
| Application hardening | |||
| Advanced Persistent Threat (APT) protection | |||
| Fileless malware protection | |||
| Targeted attack prevention | |||
| Botnet protection | |||
| False positives verification | |||
| Protection exclusions/allow list | |||
| Hourly automatic updates | |||
| Emergency network lockdown mode | |||
| Shutdown & uninstall prevention via password | |||
| Windows Firewall monitoring and hardening | |||
| Windows RDP attack detection | |||
| Endpoint detection and response (EDR) | |||
| Suspicious behavior monitoring | On endpoint only | On endpoint and in cloud. High-confidence events only | On endpoint and in cloud. All confidence levels events |
| Incidents retention time | 365 days | 365 days | |
| Raw log data retention time | 0 days | 30 days | |
| Local detections on devices | |||
| Quick allow/quarantine/block everywhere | |||
| Device isolation | |||
| Execution tree & timeline | |||
| MITRE ATT&CK tactics & techniques | |||
| Deep threat insights | |||
| Rollback | |||
| Workspace-wide threat hunting | |||
| Endpoint visibility with OSQuery | |||
| SOC/SIEM integration via Syslog | |||
| Centralized management | |||
| Management Console included | Simplified | Fully featured | Fully featured |
| Industry leading mirror view | |||
| Web access & mobile app | |||
| “Local only” management mode | |||
| “Local & remote” management mode | |||
| “Remote only” management mode | |||
| Traffic caching relay devices (multiple) | |||
| Incident investigation tools | |||
| Forensics & audit logs | |||
| Remote scans & quarantine | |||
| Device isolation | |||
| Device health & system overview | |||
| Email, webhook & push notifications | |||
| Advanced reporting | |||
| Logs and reports retention time | 30 days | 180 days | 365 days |
| Protection policies for device groups | |||
| | |||
| | |||
| Maximum protection policies | 10 | 10 | Unlimited |
| | 10 | 10 | Unlimited |
| Maximum workspace managers | 2 | 2 | Unlimited |
| Invite Emsisoft partners (MSPs) to manage workspace | |||
| REST Web API for all features | |||
| Task automation & Windows Server features | |||
| Scheduled scans | |||
| Command line interface included | |||
| Email notifications for relevant events | |||
| Monitoring of file shares and connected storage | |||
| Protection without logged in users | |||
| Silent mode/gaming mode | |||
| Windows Server OS supported | |||
| Active Directory integration | |||
| Automatic detection of new devices | |||
| Remote deployment through relay devices | |||
| Dedicated Emsisoft benefits | |||
| Money back guarantee | |||
| Malware removal assistance | |||
| Always get the latest version | |||
| Certified protection | |||
| Privacy conscious design | |||
| Email & live chat support | |||
| Skip-the-line priority support | |||
| Call-back service (8am-9pm ET) | |||
| | See details | See details | See details |