04-04-2017 , 07:33 PM
https://www.avira.com/en/security-term/t...tion/id/19 In-the-cloud detection
What is in-the-cloud detection?
This is a type of scanning, which takes place in the cloud: the digital fingerprint of unknown files are uploaded anonymously and scanned in real time.
The Avira Protection Cloud leverages this groundbreaking technology, and acts as our early warning system, whereby unknown files are scanned and the results are quickly distributed to our entire user base.
In-the-cloud detection gets more powerful with every user, increasing its ability to quickly disseminate information on new malware outbreaks, which is why we integrate it in Avira Free Antivirus as well as our premium products. : https://www.avira.com/en/free-antivirus-windows Real-time cloud scanning
Our Protection Cloud is our early warning system, which analyzes unknown files in the cloud –
anonymously – from millions of users, to protect you from threats as they emerge in real time.
1 A suspicious file is detected 2 The file's digital fingerprint is sent to the cloud 3 The file is checked in real-time against our database 4 The file is identified as either safe or infected 5 The information is returned to the device
What is in-the-cloud detection?
This is a type of scanning, which takes place in the cloud: the digital fingerprint of unknown files are uploaded anonymously and scanned in real time.
The Avira Protection Cloud leverages this groundbreaking technology, and acts as our early warning system, whereby unknown files are scanned and the results are quickly distributed to our entire user base.
In-the-cloud detection gets more powerful with every user, increasing its ability to quickly disseminate information on new malware outbreaks, which is why we integrate it in Avira Free Antivirus as well as our premium products. : https://www.avira.com/en/free-antivirus-windows Real-time cloud scanning
Our Protection Cloud is our early warning system, which analyzes unknown files in the cloud –
anonymously – from millions of users, to protect you from threats as they emerge in real time.
1 A suspicious file is detected 2 The file's digital fingerprint is sent to the cloud 3 The file is checked in real-time against our database 4 The file is identified as either safe or infected 5 The information is returned to the device