Views:

No, with integrated anti-malware detection and remediation, viruses and malicious software are prevented from attacking data transferred and stored on the KeyArmor drive. This is an independent function of KeyArmor, not requiring the existence or utilization of anti-malware from the data source device. KeyArmor provides detailed auditing and logging relating to the anti-malware component, including version control, update integrity, update frequency and file status.

If the files that are being copied over to the KeyArmor device are infected, the KeyArmor anti-virus console detects the infected files and deletes it from the device. Different actions can be taken when an infected file is found by setting a different policy.

No. The KeyArmor does not replace the need for good security practices, such as regular anti-virus and anti-spyware scans, antivirus updates, not sharing passwords, and avoiding websites that you do not trust. KeyArmor protects your data, identity, and privacy—an increasingly necessary tool for today's security-minded consumer.

When KeyArmor has connectivity to the Internet, it connects to the Trend Micro ActiveUpdate site automatically, check for updates, and download the latest signature files. This depends on the policy settings the admin selects. In addition, the first time that a KeyArmor device is used, it will extract and update its virus signature files. This can take up to 5 minutes. Do not remove the KeyArmor during this update.

Furthermore, new threats are constantly surfacing, so even today's best solutions cannot guarantee "future-proof" protection. But since you have the ability to securely update your KeyArmor, you can make sure you have the latest and most secure software and firmware for maximum protection today.

When Key Armor has connectivity to the PolicyServer, any changes are automatically downloaded and enforced. It is transparent to the user.

Key Armor uses Trend Micro antivirus technology to fight malware infections.

Events pertaining to authentication and antivirus activities are logged. The logs are broadcasted to the PolicyServer in an encrypted package to be included in the management reports for any other endpoint devices being monitored via Endpoint Encryption’s solution sets.