IDPS
Subscription
€ 33.70 per year / € 2.81 per month
Price includes € 4.90 VAT
An easy to use state of the art intrusion detection and protection system that seamlessly integrate with Windows and enhance windows defender to stop malware and Cyberattacks before they cause harm
Perpetual
€ 161.46
Price includes € 23.46 VAT
An easy-to-use state-of-the-art intrusion detection and protection system that seamlessly integrates with Windows and enhances windows defender to stop malware and Cyberattacks before they cause harm. The software does not require a subscription license, and the license does not expire.
Think of IDPS as an advanced combined anti-virus and firewall, but then next level.

Why are we advanced? Well, we bring lots of functionality that other products do not have. With our service, you are notified of where and whom your applications are communicating with, as well as protected against the methods and ways that you will be targeted. If we detect malicious activity, we block it before a successful exploit is used.

When we detect a problem, we fix it for you; we deal with it once, rather than having to deal with probe after probe in a never-ending game of automated malware Whack-A-Mole.

1.

Antivirus software doesn't work

Antivirus doesn't work as you think; an antivirus can only react to know Malware. It works by checking your files against a list of known viruses and comparing the two. If a virus is new and unknown, there is nothing to compare it to, and you will get infected.

2.

Firewall doesn’t stop anyone

The built-in firewalls with the default settings leave a computer wide open to any outgoing communication, even to know malware control servers. Making things worse, managing a few 1000 rules daily to address the latest compromised servers is just not doable.

3.

Malicious activity isn't challenged

No feature or method on a windows PC or server will trigger a warning if a probe is detected, let alone prevent the malicious actor from successfully using an exploitable vulnerability. We have that feature. We block them before they succeed.

4.

Be in control of communication

Windows doesn't have a feature that enables users to control or block access to a domain from applications easily. As a result, the applications are able to turn you into a product that can be marketed and sold to third parties. We make transparent which applications are communicating and allow you to block or filter this with a simple mouse click.

Product comparison

  Subscription Perpetual
 
IDPS Device
IDPS_HOME
IDPS Home Office
IDPS_HOME
IDPS Family
IDPS_HOME
IDPS Device
IDPS_HOME, InstalationMedium
IDPS Home Office
IDPS_HOME, InstalationMedium
IDPS Family
IDPS_HOME, InstalationMedium
Look who-is talking

Understand what applications are sharing your data as well as who is giving instructions to your device.

Reputation based firewall

Extend the firewall with reputation based filtering that will block malicious actors before they successfully are able to exploit your system.

Sandbox

Prevent Phishing and open attachments in a safe environment and block access to malicious servers and website sites to all programs including your web browser.

Smart Blocking

Prevent your system from being accessible from any region in the world or any provider like tor or Chinese telecom operators.

Self-reliant malware baseline

Has own machine learning capabilities and can generate full malware subscription using open source data sources without IDPS subscription feed.

  28.80 77.76 108.00 138.00 331.20 448.50
  Buy Buy Buy Buy Buy Buy
Frequently asked questions

Simple to answer really, consider the following 8 points

  1. Have you been handing out your WiFi password to some one, especially some one you no longer have a relationship with?
  2. Have you shared an account like streaming service like Netflix, Disney, Amazon?
  3. Could some one that was at your house have gained access to your smart devices?
  4. Did some one use your phone, lets say to order food?
  5. Did you dispose of old electronics like a printer, a phone, or any wireless-enabled wearable technology like a watch or Fitbit?
  6. You're internet service provider gave you some router, or your router is cheep, or more than a year old?

If any of the above is a ''yes'' then first, before you continue reading do this, in this order

  1. change the passwords on your email accounts
  2. change all the passwords to all financial services (banking, Credit cards, Investment portfolios...)
  3. change all passwords on all your social media accounts

Also, if any of the following is true 7 You any one in your household plays on-line games. 8 You have data that ... you can't afford to loose, or would not like to share with the whole world.

Here are the common ways where you will be exposed

  1. Infrastructure gets attacked from the world wide web by dual use software that will scan for vulnerabilities on your network literally giving a detailed road map of how to gain access;
  2. Your WiFi network is easily targeted by individuals that attack router via its default user name and password as well as remote management configurations. If they really want to get in, then they will get in, and they will use software like RouterSploit or MetaSploit to join your network;
  3. Infrastructure gets attacked by its own edge devices like routers and firewalls, sounds bizarre right, well it’s the most common exploit used by attackers. A hacker will take over an edge device like a router and use the router to attack the owner of the network from within;
  4. You get attacked via your local network using compromised hardware like other computers on the network. The network can be your home or office network but also that cool VPN network;
  5. Users get attacked by your IoT devices like a smart thermostat, smart TV’s, smart light bulbs, Air-conditioning, even their own phone via that cool app/ game. All these devices have software that is not designed with security in mind and has no anti-virus or firewall on it;
  6. Large organizations get attacked all the time via an employee bringing compromised hardware to the workplace or, the user gets compromised themselves when he/she connects to the office.

We do not store credit cart or any other data that would be considered identifiable GDPR related, we do not even use cookies to identify who you are when you visit the site again.

If you provide us with your email address we will use it to inform you when we detect that your personal data is being sold on the dark-web. If you do not than this feature will only work if your PC is active as your PC knows your email addresses and the intrusion detection service validates those for you.

Some services like emailing customer support or contacting us via WhatsApp requires us being able to identify who you are and that you are a client with an active support contract. It would likely speed things up but most of the time it's not needed.

IDPS comes with several extra layers of protection, the list is not complete but it represents the 6 most common ways ransomware/ cybercrime is used to bypass a firewall:

  1. Windows firewalls leaves a computer wide open to any outgoing communication, even when communicating to known malware-controlled servers, IDPS prevents that.

  2. Cyberattacks are coming at you from all places and at all times, it’s relentless and it’s automated. Windows is extremely “user friendly” in that it allows attackers an infinite number of attacks and actually never takes any defensive measures. IDPS does, if a network scan or attack is detected then any and all access from that source is blocked, even if the attacker eventually would “guess” the right login/password combination or port he will never gain access as he is already blacklisted.

  3. IDPS is fully automated and actively monitors your computer. it requires no user interaction, no data subscriptions, and therefore no computer skills to stop an attacker.

  4. IDPS will detect abnormal communication. If it does, then IDPS will shield your computer and block these computers or smart devices in your office or your home network from harming your computer.

  5. IDPS can send automated firewall abuse reports to the Internet Service Providers that are hosting these malicious activities. If after some time the activity doesn’t stop, then IDPS just blocks the whole data center from accessing your computer and your computer from accessing that data center, it’s like they no longer exist.

  6. IDPS will block domains and IP addresses from known active malicious and or infected domains. This prevents any application on your computer, and not just browsers, from accessing these infected sites. By blocking these domains IDPS also protects you from other attack vectors like spear-phishing emails or macros that use these sites to download malicious payloads. Being able to block malicious domains is important as a blocked domains can’t be used to infect your system.

The cold hard truth is that an Antivirus application only reacts. An anti-virus application works by checking your files against a list of known virus signatures. Think about it this way, last week’s viruses will make it into next week’s anti-virus definitions. If a virus is new and yet unknown, there is nothing to compare it to. IDPS offers a safe environment for these files to be opened, if they execute malicious code, it will do so without causing harm and you won’t get infected.

No, all products are licensed per machine as it is a machine that is protected. The machine can have several users, they will all be protected, that’s fine.

What our customers are saying
Product license
Terms and Services

The following terms and conditions apply to all software products offered by VESNX. Please note that the terms on this page are a small subset of terms and conditions that can be found at: https://www.vesnx.com/terms.

Perpetual licenses

Products with a perpetual license do not expire and will be maintained by VESNX for as long as the operating system is supported by its vendor."

Subscription license

Products with a subscription are eligible for product updates and support migrations with the vendors operating system.

Malware updates

All products have access to product security updates, normally these updates are applied without you, the user having to get involved. Any products that have dependencies on malware signatures are automatically updated using the frequency in the settings of the products. Depending on the product, these updates could be near-real-time or with an interval ranging from minutes to days.