- May 8, 2015
- 881
I personally would recommend this product because of it's unique engine layout, low price, great customization, etc.
Installation process is quick and easy. You do not need to enter a email or other details to get a trial. During setup you can enter a key or select trial (which lasts for 30 days).
As you can see, the idle RAM usage is quite low for a multi-engine AV.
During scan, you can expect regularly high CPU and high potential for high disk usage. Take note this VM drive was hosted on my SSD, not HDD. HDD will no doubt take a heavier hit.
This is the typical alert you will get while attempting to connect to a malicious/phishing web site. As mentioned already, phishing protection is not the best and could improve.
During testing, I entered onto website that contain hidden malcious scripts. Trustport (to my surprise) is actually quite good at blocking these guys.
Again to my surprise, Trustport does very well against web based exploits. What I found weird was how Trustport isn't so good at blocking exploits on other desktop applications such as pdf readers. One of which was a ransomware (quite a weak one in fact - so I am very disappointed). Adding extra folders and the like to Application Inspection should prevent malware like ransomware from take over (encrypting) your files.
As you'll notice, I have checked to trust digitally signed application to avoid false positives for Microsoft system and applications. This may allow digitally signed malicious application through if AV/Application Inspection does not catch any malicious activity or match a signature. During an alert, Trustport will give you the information needed to decide what you should do including things like IP address, remote port, local port, etc. During testing, the firewall was a large contributor in keeping the system clean.
Whether it is a dropped file, file in transit (downloading), etc, with having Trustport "ask user", you will get a plethora of options. Action is immediate and I have experience no delays in removal process.
When a file (either malicious or trusted) attempts to modify any protected files/registry (by default, this is system only, not applications), you will get an alert with details of the file in question, the action trying to be taken, and options of what response you would like to take.
One thing to note with this module is that if you chose to remember choice, the rule will be saved. Future executions/actions of this file will be allowed/denied depending on the option you chose. To delete the rule if you made a mistake (or other reasons), you must open up the interface, select "Advanced Configuration" on the bottom left, click "Application Inspector", then "Advanced" buttom on the bottom right and under "User rules" tab will be a list of files for allowed, restricted, or blocked.
You can either right click an entry and remove, or click then hit "Action" at the bottom then remove. You also will get options to change its rating to one of the other two if you so wish.
Well that is it for this written review. Will edit any mistakes/add information if needed. Apologies if this software was reviewed for 2015 version already. I figure since I'm messing it with, mind as well put up a review.
Installation process is quick and easy. You do not need to enter a email or other details to get a trial. During setup you can enter a key or select trial (which lasts for 30 days).
As you can see, the idle RAM usage is quite low for a multi-engine AV.
During scan, you can expect regularly high CPU and high potential for high disk usage. Take note this VM drive was hosted on my SSD, not HDD. HDD will no doubt take a heavier hit.
This is the typical alert you will get while attempting to connect to a malicious/phishing web site. As mentioned already, phishing protection is not the best and could improve.
During testing, I entered onto website that contain hidden malcious scripts. Trustport (to my surprise) is actually quite good at blocking these guys.
Again to my surprise, Trustport does very well against web based exploits. What I found weird was how Trustport isn't so good at blocking exploits on other desktop applications such as pdf readers. One of which was a ransomware (quite a weak one in fact - so I am very disappointed). Adding extra folders and the like to Application Inspection should prevent malware like ransomware from take over (encrypting) your files.
As you'll notice, I have checked to trust digitally signed application to avoid false positives for Microsoft system and applications. This may allow digitally signed malicious application through if AV/Application Inspection does not catch any malicious activity or match a signature. During an alert, Trustport will give you the information needed to decide what you should do including things like IP address, remote port, local port, etc. During testing, the firewall was a large contributor in keeping the system clean.
Whether it is a dropped file, file in transit (downloading), etc, with having Trustport "ask user", you will get a plethora of options. Action is immediate and I have experience no delays in removal process.
When a file (either malicious or trusted) attempts to modify any protected files/registry (by default, this is system only, not applications), you will get an alert with details of the file in question, the action trying to be taken, and options of what response you would like to take.
One thing to note with this module is that if you chose to remember choice, the rule will be saved. Future executions/actions of this file will be allowed/denied depending on the option you chose. To delete the rule if you made a mistake (or other reasons), you must open up the interface, select "Advanced Configuration" on the bottom left, click "Application Inspector", then "Advanced" buttom on the bottom right and under "User rules" tab will be a list of files for allowed, restricted, or blocked.
You can either right click an entry and remove, or click then hit "Action" at the bottom then remove. You also will get options to change its rating to one of the other two if you so wish.
Well that is it for this written review. Will edit any mistakes/add information if needed. Apologies if this software was reviewed for 2015 version already. I figure since I'm messing it with, mind as well put up a review.
Last edited: