IKARUS Antivirus

IKARUS Software GmbH” existed several years before IKARUS anti.virus (formerly IKARUS virus.utilities), the first and best-selling product that made the company internationally known.

Shop Login Register

Contact Info

Head Office - 27-28 Super Market 5 Milestone NH-71 Jind 126102, India
Reg.Office - 217, 2nd Floor, Hemkunt Chambers, 89 Nehru Place, New Delhi-110019, INDIA
[email protected]
Support - +1-1888-499-2234
Sales - +1-1888-499-2232

Follow Us

Cloud Security Solutions

Advanced security technologies from the cloud

IKARUS cloud.security

Available immediately and at any time: With the Managed Security Services from IKARUS cloud.security

, you can save yourself time-and costly consuming hardware purchases as well as technical knowledge. We protect your end devices, email gateways and mobile devices with our powerful cloud services.

As a FireEye Platinum Partner, we have also implemented FireEye’s hardware and security services in the areas of Endpoint Protection, Network Protection, Mail Security and Security Operations Center in the IKARUS data center. Benefit from global threat intelligence with local data processing in Austria!

IKARUS anti.virus in the cloud

Central Antivirus-Management in the Cloud

Highlights:

  • Web-based management console to manage clients, software and license
  • Proactive and reactive Malware detection with a multidimensional process, Behaviour-based analysis and exploit detection
  • Malware scans directly on the computer; no data transmitted to the cloud
  • Virus warnings and flexible notifications of defined events
  • Virus database updates several times a day, including regular program updates
  • User-friendly cloud management portal for administration of all installations
Learn More
IKARUS mobile.management

Mobility solutions for corporate environments

IKARUS mobile.management is a comprehensive solution for private and mobile devices in corporate environments.

  • Protection against infections, data loss and unauthorized access
  • Simple and scalable implementation of company policies even on private devices
  • Management and overview of inventory and database
  • EU GDPR-compliant and tested in independent audits
Learn More
IKARUS mail.security

Email security with ATP option

IKARUS mail.security with ATP scans emails and attachments, detects and blocks Malware, Spam and zero day attacks, even before they reach the network.

  • Real-time protection against the latest virus and Spam outbreaks
  • Highly professional multi-level anti-spam concept
  • Behaviour-based analyses using own simulators
  • ATP add-on: additional signature-independent analysis with sandboxes
Learn More
FireEye Mail Security

Cloud-based secure email gateway

Strengthens the protection against targeted e-mail based cyber-attacks, by prioritizing important alerts and averting and containing security incidents on the basis of global detailed threat intelligence.

  • Blocks unauthorized access to your employees, data and resources
  • Protects against spear-phishing campaigns, attacks using false identities, unknown Malware and Spam
  • Individual classification thanks to in-house and e-mail specific threat intelligence
  • Accelerated countermeasures thanks to context information from incident response engagements
Learn More
FireEye Endpoint Security

Stop the known, find the hidden and fix the breaches that matter

FireEye Endpoint Security combines the best of legacy security products, enhanced with FireEye technology, expertise and intelligence to defend against todays cyber attacks. FireEye uses four engines in Endpoint Security to prevent, detect and respond to a threat.

Even with the best protection, breaches are inevitable. To ensure a substantive response that minimizes business disruption, Endpoint Security provides tools to:

  • Search for and investigate known and unknown threats on tens of thousands of endpoints in minutes
  • Identify and detail vectors an attack used to infiltrate an endpoint
  • Determine whether an attack occurred (and persists) on a specific endpoint and where it spread
  • Establish timeline and duration of endpoint compromises and follow the incident
  • Clearly identify which endpoints and systems need containment to prevent further compromise
Learn More
FireEye Network Security

Effective protection against cyber breaches for Mid-size to large organizations

Detect threats others miss

  • Apply state of the art, signature less detection and protection against the most advanced threats, including zero-days.
  • Combine heuristics, code analysis, statistical analysis, emulation, and machine learning in one advanced Sandboxing solution.
  • Enhance detection efficacy with front line intelligence derived on the front lines of the world’s biggest breaches.
Learn More