Powertech Antivirus

Promote this Nomination

Additional Info

Company (that provides the nominated product / solution / service)HelpSystems
Websitehttp://www.helpsystems.com
Company size (employees)500 to 999
Type of solutionSoftware

In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:

- Powertech Antivirus provides native scanning for IBM i, AIX, and Linux operating systems. A native solution avoids the sluggishness and instability of PC-based scanning, since it doesn’t require a mapped drive or increase the network’s load.
- Simplifies compliance and audit reporting with automated reports on scanning activity, infections found, and malware removal and quarantining activity.
- Users can choose to scan files in real-time or on-demand to schedule scans outside of normal business hours and save processing power.

Overview

Powertech Antivirus provides Linux, AIX, and IBM i servers with protection from viruses, worms, and malware threats. The powerful solution includes heuristic behavioral analysis and one of the most comprehensive sets of virus signatures available. Powertech Antivirus automatically downloads the latest virus definitions to stay up-to-date and protect against current threats.

Many organizations routinely run antivirus on workstation PCs, but data attackers and threat actors are eager to exploit servers as well. Powertech Antivirus is a server-specific native antivirus solution that doesn’t overburden the network and scans every part of the server to identify, quarantine, and remove malicious programs before harm is done.

With an enterprise strength commercial scan engine, Powertech Antivirus also has a centralized dashboard for simplified management. These dashboards enable users to quickly find the status of every endpoint in the infrastructure and read details on any warnings or critical issues that have been found.

Using behavioral analytics, Powertech Antivirus is even able to spot a new virus before it becomes widespread and causes damage. The heuristic analysis takes note of malicious behaviors and can report a possible infection when the suspicious activity reaches a set threshold.