Kaspersky Internet Security 2011 review
We review Kaspersky Internet Security 2011 to see whether it can help protect against modern-day computing threats.
Although these are all fine additions, they increase the complexity of what was already a very full package, with configurable firewall, email, web protection, identity protection, anti-spam, IM and parental control modules.
The developers have made a visible effort to simplify the UI from last year's showy design, but if we're honest the new one simply looks drab - while remaining a labyrinthine affair, with tabs, dropdowns, links and buttons all over the place (there are more than 40 different things you can do from the front window alone). Power users may enjoy the wealth of options and features to discover and play with, but the familiar acronym certainly doesn't stand for "Keep It Simple."
On the upside, KIS 2011 can't be accused of bloat in the conventional sense. On our 3GB test system, running Windows 7 Ultimate on a Core i7-920 processor, installing the software added just three seconds to the boot-time of a bare system, and raised the memory footprint by just 63MB - 80MB less than Norton.
Getting the best from this suite demands a degree of technical nous: the Safe Run features, for example, are useful only if you know when to activate them, and its myriad options are likely to overwhelm novices.
You pay for that power too: G Data InternetSecurity 2011, for example, is both simpler and cheaper.
But for those who like their security software complicated and configurable, Kaspersky Internet Security 2011 is a great choice. Its signature scanning may still take only the bronze medal, but it makes up for that with impressive heuristics, a small system footprint, and all the knobs and levers you could wish for.
This product won't be for everyone, but it's an effective and very powerful package for the more technical user nonetheless.
800MHz processor required. Windows XP and Windows Vista supported
In This Article
The ultimate law enforcement agency guide to going mobile
Best practices for implementing a mobile device programFree download
The business value of Red Hat OpenShift
Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShiftFree download
Managing security and risk across the IT supply chain: A practical approach
Best practices for IT supply chain securityFree download
Digital remote monitoring and dispatch services’ impact on edge computing and data centres
Seven trends redefining remote monitoring and field service dispatch service requirementsFree download