Optimal Guard

What is Optimal Guard?

Optimal Guard is a solution that protects your PC from a malicious program causing unauthorized remote control.
It lets you know if your PC is controlled by other parties so that you can stop and delete the malicious program file that allows other parties to control your PC.

  • Optimal Guard detects and stops suspicious behaviors sending information outside. What existing anti-virus software does is to compare target files with the pattern file that the software has, which means it cannot detect viruses not listed in the pattern file. On the other hand, Optimal Guard blocks the attempt to send out information even if computers are already infected by malware.

Illegal remote control incident

optimal guard image

In October 2012 in Japan, an unauthorized remote control incident occurred, which shook the Japanese society.
The real criminal has not been arrested yet…

General picture of the incident

optimal guard image

Threats of remote control virus

optimal guard image

How to protect

optimal guard image

General picture of Optimal Guard

General picture of Optimal Guard

The difference from existing anti-virus software - The way anti-virus software works

optimal guard image

The difference from existing anti-virus software - The way Optimal Guard works

optimal guard image

The difference in coverage between Optimal Guard and general anti-virus software

optimal guard image

Optimal Guard Main Features

Feature Feature Description
Key Logger Detection/Restriction Deactivates key logger that records input information from a key board.
Remote Control Monitoring/Restriction Informs a user if a PC is remotely controlled by other parties.
Stops screen transfer and remote control.
Post Contents Search Shows warnings if post contents are not appropriate.
Restricts sending messages that contain letter strings of “Murder”, “Terror”, etc. to a message board without a user’s consent(CSRF).
Logs Records logs of screen transfer, remote control, and post contents for analysis.

* This product includes software developed by the Kungliga Tekniska Högskolan and its contributors.
* This product includes software developed by Yen Yen Lim and North Dakota State University.
* This product includes software developed by the University of California, Berkeley and its contributors.

Inquiries

Top