Malware Protection

Signature and heuristic-based tools to detect suspicious behaviour that is indicative of mal-code or malicious characteristics; such as: Trojan downloaders, viruses to infect hosts and/or worms to subvert and self-proliferate.