RogueKiller

RogueKiller

Adlice Software
+
+

Related Products

  • ESET PROTECT Advanced
    2,263 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,699 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • ThreatLocker
    681 Ratings
    Visit Website
  • Bluehost
    29,377 Ratings
    Visit Website
  • PowerDMARC
    252 Ratings
    Visit Website
  • SenseIP
    1 Rating
    Visit Website
  • Airlock Digital
    35 Ratings
    Visit Website
  • MaintainX
    2,492 Ratings
    Visit Website
  • Greatmail
    9 Ratings
    Visit Website

About

Thanks to its powerful engine RogueKiller is able to find known and unknown malware, of all kinds. Search and clean viruses, ransomware, trojans, and other malware. Powered with innovative Artificial Intelligence and cloud signatures engine, RogueKiller is the best virus removal tool. Try our free virus cleaner now for free. RogueKiller antimalware software is shipped with state-of-the-art malware protection. The real time protection stops infected programs before they execute. Protect your important documents against corruption and theft. With the increasing threat of Ransomware, it's very important to keep your documents secured. RogueKiller antivirus comes up with a very innovative clipboard protection. The engine monitors suspicious programs and prevents them from reading -or writing- sensitive data from the clipboard.

About

The VFind Security ToolKit (VSTK) is a suite of four powerful network, and computer, anti-malware utilities that provide flexible and uncompromising computer anti-malware protection. The VFind™ Security ToolKit (VSTK) is a suite of four powerful network and computer anti-malware utilities, that provide flexible and uncompromising computer anti-malware protection. CIT: Is a fantastic anti-malware security tool that has multiple uses. It reports on all files that have been removed, added, modified or duplicated. It can tighten baseline configuration control down to a single bit. It can also be used with surgical precision on an entire system or single file. The CIT tool produces a database of cryptographic hash values for every file it is directed to manage. Besides its use in anti-virus protection, the UAD tool is built for making identification based upon direct inspection of the data. It makes no assumptions about the file’s contents based upon the file’s name.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Businesses searching for an anti-malware solution thats able to detect and remove generic malware and advanced threats like rootkits, rogues, worms

Audience

Companies searching for a solution providing network and computer anti-malware utilities

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$15 per year
Free Version
Free Trial

Pricing

$1035 one-time payment
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Adlice Software
Founded: 2013
France
www.adlice.com/roguekiller/

Company Information

CyberSoft
www.cybersoft.com

Alternatives

AdwCleaner

AdwCleaner

Malwarebytes

Alternatives

PT MultiScanner

PT MultiScanner

Positive Technologies

Categories

Categories

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Integrations

No info available.

Integrations

No info available.
Claim RogueKiller and update features and information
Claim RogueKiller and update features and information
Claim VFind Security ToolKit and update features and information
Claim VFind Security ToolKit and update features and information