Collects information relating to security from your existing system components. Providing a real time overview of your system security and vulnerability.
Product monitors for changes to Windows files, allowing for detection of unauthorized changes, as well as optional automated backup of files as they are changed.