MWL
Technology
MicroWorld has developed a very unique and highly
superior technology to take care of latest security
breach coming up in today’s digital world.
Our products are built on the MicroWorld Winsock
Layer Technology (MWL). This technology gives MicroWorld
products a more advanced means to protect your
computer from virus and other attacks.
Now, what is MWL?
When you connect to the Internet, you do so through
the Windows Socket (Winsock) layer. The Winsock
layer acts as an interface between your computer
application and the Internet. It does its work
very efficiently and you can surf the net, download
programs etc unhindered. But it never distinguishes
between a virus infected file and a clean one.
Our MWL layer sits on the Winsock layer. It checks
and analyzes all traffic between your system and
the Internet. All e-mails, attachments, downloads
etc are scanned before they enter your system thus
providing you a secure blanket. Our applications
have a vast database of all known viruses and other
threats.
MWL ensures that any files with these known threats
are barred from entering your system. OK. Now what
about new or unknown virus?
Virus infected files display suspicious forms,
content or have strange codes. MWL recognizes any
file, e-mail, attachment etc, which look strange
or suspicious. Such objects are barred from entering
your system. OK, OK. How are MicroWorld products
better and different from others?
Products made by other manufacturers do not stop
threats from entering your system. Incase of other
AntiVirus software, it allows the data to enter,
permit to write on the hard disk (temporary folders)
and then the software scans the data for viruses.
IF and when these threats are identified, then
these Anti-Virus software tries to disinfect the
files. The whole process is subject to jargon like ‘possible
scenarios’ ‘ threat perception’ etc.
You loose priceless data and spend valuable time
in removing a threat, which
should not have been allowed into your system in
the first place.
MicroWorld endorses the timeless proverb “prevention
is better than a cure”. MWL technology sits
on the Winsock Layer and checks for security breach
(like content breach or for virus signatures) that
means
the data is checked much before it is written on
the hard disk, or while the date is in transit.
The
data is checked when it is about to enter the system,
before it reaches the OS or the application files.
In case
there is a security breach or virus signature it
immediately deletes the data or quarantine’s
the data.
OK, Ok, Sounds interesting. I would like to know
in more technical terms how it is done?
To be more technical the email entering the MWL
passes through the Object-Dis-assembler and divided
in three parts a) Header, b) Body and c) Attachment.
The body and attachment are passed through the
Virus- Analyzer and Content-Analyzer Engines. Each
and every attachment (including the body, if it
is
in HTML format) is checked for
·
Viruses, using the eScan Content Security and Antivirus
module
·
Restricted Contents, using the Content Analyzer
Module.
·
Restricted Attachment, using the Attachment Validation
engine.
Depending upon the results obtained by the Virus-Analyzer
and the Content Analyzer, the body and any attachments
are reassembled and the email message is either:-
·
Delivered to its Destination.
·
Forwarded to the administrator.
·
Deleted
·
Quarantined (Isolated)
In other words it is advisable to keep your security
guard outside your house and not inside the house.
That's what MWL does, checks the data before entering
the system, not like other software, which checks
the data after entering the system. Visit www.mwti.net/mwl.asp
for more details on MWL technology. Microworld
has got a very good recognition worldwide due to
the implementation of MWL technology. The growth
of Microworld has increased leaps and bounds with
increase in market share in various countries
due to the development and implementation of the
MWL technology. Remember, Virus authors are extremely
tech-savvy people with access to advanced technologies.
You
need advanced solutions to beat them. Your clients
trust you for their security needs, so you should
offer
them the best and get a better share in the market.
|