Can be used to:
* Protect your computer from compromises by worms, virus and email-borne malware
* Prevent your computer from being used as a staging point to amplify attacks and compromise others
* Prevent exploitation of known bugs in the operating system and applications running on your computer
* Prevent exploitation of unknown bugs (0-day) in the operating system and applications running on your computer
* Detect and prevent execution of adware, spyware, trojan horses and other malware on you computer User Guide Here