360 antivirus, 360 security antivirus, antivirus download, antivirus software, best antivirus, buy antivirus online, free antivirus download, internet security, Free Antivirus, Antivirus Online

The word "Protegent" is derived from a French word "Protégee", which means "To Protect".

Protegent Complete Security Software 1PC/1YR


₹2000 / $40  Buy-Now-Button  dw

*For Indian Users CCAvenvue Only/Rest Countries Can Process Using Other Gateways



Protegent 360 Complete Security goes with the name and is an advanced complete software package with extremely advanced security features for comprehensive protection against advanced online cyber threats. Packed with extremely unique and advanced features, it provides 75% extra features as compared other products available globally. Protegent 360 is designed with the prime motive of protection of data from viruses, data theft and attempts of unauthorized access to confidential data. Protegent Complete Security is capable of protecting your business, essential data and computer/laptop from malicious attacks.
We understand the importance of data security and data theft prevention, that’s why experts at Unistal have designed complete security which features:

  • Effective Antivirus Security
  • Extreme protection against online cyber threats
  • Proactive data recovery of lost/deleted data
  • Prevention of unauthorized data leakage from different external sources
  • Reporting and monitoring of user’s application and internet use
  • Secured data encryption in case of laptop theft
  • Enhances system performance
Protegent 360 is a complete package of 6 different modules :-

  • Total Security
  • Port Locker
  • Locate Laptop with Data Encryption
  • Activity Reporter & Monitoring
  • SysBoost
  • Crash Proof


Protegent Total Security goes beyond malware protection and with its extremely advanced features offers security against viruses, malware, root kits, Trojans, and other advanced online threats. It offers secure web browsing for you and your family. Protegent Total Security is termed to have 30% extra protection from other internet security products with the help of especially designed virus scan engine.


Port Locker is one of the modules present in Protegent 360 which is data leakage prevention software. It prevents any sought of unauthorized data leakage from any external media that can be in any form like USB, Printer, Network Adapter, CD/DVD, IEEE 1394 and others. Port locker does it by blocking all the possible ports of computer through which data can be transferred. For every organization and individual, it is always challenging to keep confidential data safe and protected which Port Locker software does at ease. There is a certain requirement of controlling, monitoring and prevent the flow of data through computer. This product gives assurance to protect the flow of data from all the ports leaving no chance of data theft.


If your laptop gets stolen, then Locate Laptop is the perfect tracking software which will provides pin point location when laptop is connected to internet. It uses Google Maps to show the exact location of the laptop along with longitude and latitude details as well. Locate Laptop has the advanced feature of finding out the location using the IP address when it is connected to internet. It also has a feature of automatic data encryption on the data present in the stolen laptop if it is not connected to internet for a specified period of time making the data unreadable to the thief. Locate Laptop helps the admin to keep track of employees’ laptop and location using a master login.


Activity Reporter is a very important module in Protegent 360 which is responsible of monitoring and reporting of application and internet activities of the users. Activity Reporter works as a spy which records every keystroke on the computer or monitor internet on regular basis without the user having the knowledge of same. The software can also be customized to record any blacklisted applications used on the computer system. The admin can also select from the various reporting format and can schedule them to get emailed to the configured email ID.


SysBoost is system tune-up software which improves/enhances the performance of user’s computer by deleting junk files, folders, temporary registries and also defragmenting drives. This is the best application which is designed for MS Windows and help in maintaining, managing and optimizing computer system performance.


Protegent data security product range comes with inbuilt proactive data recovery module: Crash Proof which is especially designed to prevent any sought of data loss incidents. It provides 100% assurance to protect data that has been accidentally lost, deleted, corrupted or got inaccessible due to any reason. Crash Proof records the file indexes/ disk properties and updates them at regular intervals. This recorded information is stored in protected areas and used to recover lost files and also un-format a lost drive.


  • Windows 10, Windows 8 and 8.1 , Windows 7, Vista(Service Pack 1), Windows XP(Service Pack 3)

Minimum system requirements

  • 1.8 GB available free hard disk space (at least 800 MB on the system drive)
  • 800 MHz processor
  • 512 MB of memory (RAM)

Recommended system requirements

  • 2.8 GB available free hard disk space (at least 800 MB on the system drive)
  • Intel CORE Duo (1.66 GHz) or equivalent processor
  • Memory (RAM):
  • 512 MB for Windows XP
  • 1 GB for Windows Vista, Windows 7, Windows 8 – 8.1 and Windows 10.




File Wipe
Wipes off unwanted files from your system.


Removes unnecessary files and entries to improve the functioning of system

Registry Cleaner-
Scans the registry and gives the accurate information of unwanted registries. It gives you the option to select and delete the unwanted registries, thereby making your system free from junk files.



Registry Restore-
Helps to restore registry files which get deleted up when tuning up.

Internet File Wipe-
Wipes away unwanted temporary internet files like cache memory, cookies, browsing history from your system permanently.



Disk Defragmenter-
Disk defragmenter is a tool that rearranges the data on your system’s drive so that it can run more efficiently.


Block USB Port-
Blocks all ports with the help of Port Locker Software



Whitelisting of Authorized USB Devices-
Unique feature of Whitelisting the authorized USB by using unique hardware ID of device

USB Read Only Feature-
Option of assigning USB read only setting to white listed and non white listed USB Mass storage device.



File Transfer Logs To and From USB-
File Transfer logs will show the reports of file transferred to and from USB device along with the reports of files added, removed, renamed and modified.

Block IEEE 1394-
Blocks IEEE 1394 USB to prevent any kind of real time data transfer



Block Network Adaptors-
Block network adaptors to prevent any kind of data transfer over a network.

Block CD/DVD-
Removable or in-built CD/DVD can be blocked by blocking the CD/DVD port with which no one will be able to read or write the CD/DVD from system



Block Printer-
No print command will work when printer port gets blocked.

Block/ Unblock as per schedule or block port when the system is idle-
Multiple or single ports can be blocked automatically according to the set schedule and you can even block/unblock the post if you leave your system idle. Remember, only authorized user can unblock the port by using the password.



Email Filtering-
Email filtering shows the log of outgoing email filtered and blocked on user machine. The filtered content includes date and time when the mail was blocked, receiver’s email address, name, size of attachment, Email subject and content of body.

Block Bluetooth-
This feature blocks all Bluetooth devices which can be connected to the system for transferring internal information.


Block/Unblock Single/ All Ports-
This feature gives user the ability to block single or multiple ports as per his specific requirement.


Monitor Internet Activity
Captures all Internet activity with features of Blacklist and White list

  • Blacklist-Internet activities (web sites) which are added in this list are monitored and be visible in alerts.
  • Whitelist-Internet activities which are added in this list are ignored and not visible in alerts.

Monitor Application Activity
Captures all system application activity with features of Blacklist and White list

  • Blacklist-All the application activities that are added will get captured and be visible in alerts.
  • Whitelist-All the application activities that are added in this list, are ignored and not visible in alerts.

User wise reporting
Complete activity report w.r.t. user login if multiple users are working on same machine



User login Reporting
Provides the details of the each user login and log out time

Monitor Keystrokes
Capture all key strokes. Intercept DOS-box and Java –chat Keystrokes.



Monitor Screenshots
Capture the Screen shot within a specified time Interval or on every mouse click.

Monitor Chat Activity
Captures ICQ, Miranda, Skype, Google Talk, MSN, AIM, AOL, Yahoo, QIP Chats.



Monitor Clipboard Activity
Monitor all the cut, copy, paste activities.

Monitor Working Log
Logging of working hours and idle time, Its display the time for which the user has been working or idle.






Laptop/ User Tracking
Secure Webpage for every user to Keep (monitor) a close eye on movement of person with the designated laptop e.g. company employee



Automated Data Encryption
Remotely launch the data encryption module on predefined sensitive files and folders. Encrypts Data even if laptop is not connected to Internet for particular perio

Tamper Proof Agent
Reports on server contain information on date, time, Public IP, Location, country, state, city, ISP, Longitude & Latitude. No human intervention for reports






Antivirus and Antispyware-
Safeguards your system against Viruses, Trojans, Spywares and Malware attacks.



Blocks all web pages which support virus scams and personal data phishing attempts.

Active virus control-
Real time protection is an important feature offered by Protegent Total Security Solution. This feature continuously monitors the applications running on computer, looking for malware-like options.



Web Control-
Offers real time protection against online threats whenever performing any kind of activity online.

One Click Removable Device Scan-
Instantly monitors your USB as soon as you plug it in your system.


Hourly Update-
Protegent’s Internet Security Module takes update every hour and protects your system from new viruses.

Antispam feature of this module helps you remove unwanted emails before you download them to your computer. This feature instantly filters out messages that seem suspicious. The “weeding out” process makes sure that spam does not gets anywhere inside your mail box. Having such protection helps assure that you and your employees do not accidentally open any unfamiliar communication that infects your entire network.


Two-way Firewall
which not only prevents hackers from accessing your computer but also malicious programs from retrieving sensitive information without user’s permission.  The double control makes impossible any form of unauthorized activity. Special shields prevent intrusions from local net and Wi-Fi net. Placing itself in the firing line, the bidirectional firewall keeps your PC far away from hacker and malware, leaving you calm and relaxed while using your computer and Internet.

Block Ads and Website-
Pop up ads and insecure websites are a result of your computer being infected by Adware or Spyware. The highly advanced feature of this module even block scam websites which gives you the option to continue further or not.


Personal Data Filter-
The latest encryption technology incorporated in Protegent Total Security Solution allows you to protect your personal data from getting leaked. If you have your personal details like credit card number, SSN and other personal data in encrypted form, then it will never get exposed to any online threat.

Setting Protection-
This feature helps you save and privatize your settings using a password. This in turn prevents further modifications even if the other user has admin rights.



Deleted File/Folder Recovery-
Recovers deleted or lost files if they are lost from your PC, even if they are not available in Recycle Bin.



Un-format Formatted Drive-
With this feature, you will be able to even unformat the whole drive, so that any important data, if lost, gets recovered easily and quickly.

Repair Corrupted/ Deleted Partition-
Protegent leads in as one of the efficient and reliable data recovery software which recovers or repair lost data even from the damaged or deleted partition. With its powerful recovery option, you will be able to copy all existing data from corrupted volume to a new drive.



Revive incase of FAT/MFT Corruption-
This feature builds back your FAT/MFT system and also supports 100% recovery in case your file system gets corrupted.


Protects from

  • Unethical Activity
  • Physical Theft of Laptop
  • Permanent Data Loss
  • System Slow Down


  • SysBoost
  • Activity Monitoring and Reporting
  • Port Locker
  • Laptop Tracking with Data Encryption
  • Total Security
  • Crash Proof

Animated Demo


Press Releases

View All

Jan 2019

Unistal Launches SmartGasNet™ Solution for City Gas Distribution (CGD) Networks more...

Jan 2019

Unistal celebrates its silver jubilee year by unveiling two new solutions more...

Nov 2018

Unistal Rolls Out ‘Trip to Thailand’ Opportunity For Its Channel Partners more...


View All

Jan 2019 at Delhi

Unistal 25th Anniversary Celebration more...

Nov 2018 at Delhi

VARINDIA 17th Star Nite Awards 2018 more...

Jan 2018 at Amravati

Rotary Indrapuri Carnival Amravati Stall No. D-3 12-15 Jan 2018 more...

Customer Reviews

"When I bought my new laptop, getting an antivirus. More..."

Stephen Armitage

"What a software! Superb internet security! more... "

- Robert Symonds

Tie Ups


  recovery satisfied-customer microsoft-certified-partner 100-secured download
© 2019 Unistal Systems Pvt. Ltd. All right reserved.
Comodo SSL