Is your PC truly safe?
Why signature-based security software is not enough
Typical security software recognizes Malware by using Signatures, a type of digital fingerprint. This means that the Malware must first be known to the manufacturer of the security software before it is possible to create a fingerprint that allows it to be recognized. The fingerprint database on your PC is then updated online on a daily basis so the Malware can be recognized.
You are probably thinking: "What about new Malware that the manufacturer of the security software has never seen? They have no way of making a fingerprint of this...". This is exactly the problem as no fingerprint means no recognition!
This is where the behavior-based Malware defense of Mamutu comes into play. Instead of using fingerprints to recognize dangerous software, Mamutu makes a decision based on the behavior of the software. This allows Mamutu to recognize new Malware long before the signature databases have been updated. These types of Malware attacks are known as Zero-Day attacks. In addition to this, behavior-based Malware recognition is the only efficient way of recognizing Malware that has been built for a single specific attack, e.g. for industrial espionage.
Mamutu - Immediate protection against completely new malware!
Mamutu's Background Guard is highly intelligent. It recognizes and blocks all potentially dangerous programs before they can cause any damage. The new Malware Intrusion Detection System (Malware-IDS) is unique worldwide and immediately warns you when a program attempts to perform a potentially dangerous or suspicious operation.
Recommended reading: Signature recognition or behavioral analysis - Which is better?
New behavior-based protection technology
Mamutu constantly monitors all active programs on your PC. As soon as a process exhibits any suspicious behavior, you will receive an alert and can act accordingly. Block Malware before it can cause any damage, by using Emsisoft's proven behavior analysis technology.
The Malware-IDS in detail
Lower resource consumption
Mamutu has been designed to use the smallest possible amount of your computer's resources. This makes it ideal for users who require high computer performance, e.g. graphics or video applications and especially games.
Quarantine in case of emergency
Always place a suspicious program in quarantine first before deciding whether to delete it, as suspicious behavior can also be exhibited by usually benign applications. Mamutu helps you to decide what to do with a suspicious program.
Staying protected is easier than you think
Regardless of whether you're an experienced computer user or a beginner, you will quickly become familar with Mamutu. You don't have to be an expert to protect yourself from Malware.
The perfect security enhancement
Mamutu recognizes and reports the following types of behavior:
- Backdoor related behavior
- Spyware related behavior
- HiJacker related behavior
- Worm related behavior
- Dialer related behavior
- Keylogger related behavior
- Trojan Downloader related behavior
- Injection of code into other programs
- Manipulation of programs (patching)
- Invisible installations of software
- Invisible Rootkit processes
- Installation of services and drivers
- Creation of Autostart entries
- Manipulation of the Hosts file
- Changes of the browser settings
- Installation of debuggers on the system
- Simulated mouse and keyboard activity
- Direct disk sector access on harddisk
- Changes of the system group policies [NEW!]
Full control over internal system activities
You can now decide for yourself what programs are allowed to start on your PC and what actions they are allowed to perform. Detailed application rules are available, allowing you to individually specify the types of behavior permitted for every application:
- Monitor application, but allow specific activities
Select this option to always allow a specific behavior for a program. In certain situations a benign program can contain a function that is very similar to a dangerous program and is therefore reported. If you are sure that this action is not dangerous then you can allow it. All other types of dangerous behavior are still reported.
- Always block this application
Select this option to permanently block a particular program. You can also use this feature as a means of child protection, by preventing certain applications from being started.
- Exclude from protection
Select this option to completely exclude an application from monitoring. Use this when you trust an application completely and are sure that it does not carry out any dangerous actions.
Bonus feature: Application protection
You can use the application rules to protect specific programs from third-party manipulation. For example, this feature is used to prevent Malware from disabling Mamutu's protection. You can also make use of this feature to protect your Browser and other important programs from being illegally terminated.
Community based alert reduction
Mamutu's community feature makes use of the "Intelligence of the masses" by providing recommendations when an alert is raised, based on the decisions of other users. A clearly understandable graphic illustrates the percentage of users that have performed each possible action (see illustration). This allows you to quickly decide whether to allow the behavior of the alerted program (other behavior types will still be alerted), exclude it from monitoring (completely trusted), block it (shut down process) or place it in quarantine (shut down process and put exe file into quarantine so it can't be started anymore).
You can also define a particular percentage value at which an application is automatically permitted. For example: If (e.g.) 90% of users have classified a background updater as not damaging, then the application is automatically permitted to run. This ensures a smooth workflow without annoying popups or the need to make an often difficult decision about an unknown process. Sharing your own decisions with the Emsisoft Anti-Malware Network is of course voluntary and can be disabled at any time.
Test 30 days for free!
Emsisoft Mamutu runs on Windows XP, Vista (32bit & 64bit), 7 (32bit & 64bit) and 8 (32bit & 64bit) with the latest service packs. As of version 3.0, Emsisoft Mamutu is fully compatible with x64.
In regular guard mode approximately 30 MB of free RAM is required. We recommend using it on computers with at least 512 MB RAM, preferably 1 GB RAM.
Unlike other malware protection products, Emsisoft Mamutu was designed to run alongside other antivirus and firewall software without problems. If you experience a conflict with another program, our support team will help to solve the problem quickly.
Mamutu + Signature Scanner = Emsisoft Anti-Malware!
While Mamutu is the ideal addition to your existing signature-based antivirus software, Emsisoft Anti-Malware provides a signature-based disk scanner in addition to the behavior-based detection methods of Mamutu. This can be used to scan your computer and clean up Malware infections.
- More about Emsisoft Anti-Malware
Double security with both signature and behavior-based protection technology