Print

Previous

Next

Understanding the Threats and Your Protections

You may want to know more about what the browser threats are and what ZoneAlarm browser security is doing about it. We’ll start with an overview and then get into more detail.

In This Section

Overview of How You are Protected

Virtualization: A Defense Shield*

Understanding Phishing, Drive-bys, and Other Threats

How Advanced Download Protection* Works

How Dangerous Site Detection Works

How Stealth Actions are Blocked*

Welcome to ZoneAlarm Browser Security

Using ZoneAlarm Browser Security

Using Private Browser: Leaving No Trace*

Security Settings Panel

Troubleshooting

Frequently Asked Questions

 
©2011 Check Point Software Technologies Ltd. All rights reserved.