Web Privacy and Security

Web Privacy and Security

There are many ways for your personal data to become compromised on the Internet, and for your identity to be exploited. Web Privacy and Security features help you protect yourself while surfing the web:

  • Anti-Keylogger - Protects your computer from any malicious software that records keystrokes
  • Anti-Phishing Chrome Extension - ZoneAlarm Anti-Phishing protects your private information from a phishing attack while browsing online, and secures your personal information from hackers and malicious websites.
  • Identity Protection - Protects sensitive identity information

Using Anti-Keylogger

ZoneAlarm Anti-Keylogger is off by default.

To turn Anti-Keylogger on:

  1. Click in the WEB & PRIVACY panel of the ZoneAlarm software client.
  2. Move the Anti-Keylogger slider to ON position.
  3. Click OK.
  4. Restart your web browsers.

Anti-Keylogger works with these supported web browsers:

  • Microsoft Internet Explorer - all versions, including Metro mode
  • Mozilla Firefox - all versions
  • Google Chrome - all versions
  • Opera - version 15 and higher
  • Apple Safari - all versions

Even though Anti-Keylogger works to protect you from malicious keyloggers, there are legitimate types of keylogging software. To let those run on your computer, you can temporarily turn off the ZoneAlarm Anti-Keylogger.

To turn Anti-Keylogger off:

  1. Click in the WEB & PRIVACY panel of the ZoneAlarm software client.
  2. Move the Anti-Keylogger slider to OFF position.
  3. Click OK.
  4. Restart your web browsers.

Anti-Phishing Chrome Extension

Anti-Phishing Chrome Extension protects your privacy from online phishing attacks and provides maximum security with great browsing performance.

ZoneAlarm Anti-Phishing protects your private information from a phishing attack while browsing online, and will secure your personal information from hackers and malicious websites.

The ZoneAlarm Anti-Phishing Chrome extension will scan all websites before letting you insert any personal information. It will alert you whether it is a safe website or a phishing attempt.

The Chrome extension gives you maximum security with optimal browsing performance as it only scans the website before inserting information.

The Chrome Extension is available for:

  • ZoneAlarm Extreme Security
  • ZoneAlarm Pro Antivirus+Firewall
  • ZoneAlarm Pro Firewall

Identity Protection

Identity theft is one of the most serious security threats to individual consumers. ZoneAlarm software adds identity protection in these ways:

  • Offers Identity Protection Service ("Identity Protection Service (USA Only)" on page 68) (USA only) that monitors your credit records for suspicious credit activity
  • myVault ("Saving Sensitive Information in myVault" on page 69) service prevents sensitive information from being sent from your computer without your control
  • Lets you configure the sites that you trust ("Configuring Trusted Sites" on page 71)

Identity Protection Service

ZoneAlarm offers a third-party service - IDENTITY GUARD Identity Protection Service. This service monitors your credit activity and alerts you of anything suspicious in your credit bureau file. It is available only in the US. If you are interested in IDENTITY GUARD Identity Protection Service, you can activate and manage it right from your ZoneAlarm software client interface.

To activate IDENTITY GUARD Identity Protection Service:

  1. Click in the MOBILITY & DATA panel of the ZoneAlarm software client.
  2. Click Set up in the Identity Protection section.
  3. Click Activate/Manage in the Identity Protection Service section.
    The ZoneAlarm Identity Protection Services web page opens.
  4. Click Get Protected Now.
  5. Follow online instructions to sign up.

Saving Sensitive Information

ZoneAlarm will protect your sensitive personal information from hackers by verifying that all requests for that information come from legitimate sources. To use myVault, you must first turn on the Identity Lock.

To turn on the Identity Lock:

  1. Click in the MOBILITY & DATA panel of the ZoneAlarm software client.
  2. Click Set up in the Identity Protection section.
  3. Move the Identity Lock slider to one of these positions:
    • Med. - shows alerts when some sensitive data about your identity is about to be sent from your computer to unauthorized destinations - you can either allow it or stop it from being sent
    • High - silently stops sensitive data about your identity from going to unauthorized destinations

To add data to myVault:

  1. In the Identity Protection page, click myVault Settings.
    The Identity Protection Settings window opens, and shows myVAULT configuration tab.
  2. Click Add.
    The Add information to myVAULT window opens.
  3. Enter the Description.
  4. Select a category from the drop-down list:
    Access PIN Personal access code. Maximum - 6 characters long. Access PINs are always encrypted.
    Address Thirty characters long, maximum.
    American Express card For security reasons, ZoneAlarm software does not record the last 5 digits of your American Express card number.
    Bank account Fourteen characters long, maximum.
    Credit card For security reasons, ZoneAlarm does not record the last 4 digits of your credit card number.
    Driver's license Fifteen characters long, maximum.
    eBay password Twenty characters long, maximum. eBay password can only be sent to eBay.
    Email Address Sixty characters long, maximum.
    International tax ID Fifteen characters long, maximum.
    Mother's maiden name Thirty characters long, maximum.
    Name Thirty characters long, maximum.
    Passport number US passport number or other international ID number - thirty characters long, maximum.
    Password Any password - twenty characters long, maximum.
    Phone Thirteen digits long, maximum. Separators, like parenthesis or dashes, are not permitted.
    US social security number Nine digits long, without dashes or spaces.
    Other Thirty characters maximum. Use this category to enter items that do not fit into any other category, or exceed the character limits of those.
  5. If you do not want to use encryption, clear Use one way encryption to store this data.
    The Encrypt option becomes available.
    Note - For maximum protection, ZoneAlarm software encrypts myVAULT data by default. For security reasons, even if you choose not to use encryption, all the PINs and passwords, the last 4 digits of your social security number, and the last 4 digits of your credit card numbers never show as you enter them. Instead, ZoneAlarm software shows asterisks.
  6. If you do not want to use data stored in myVAULT for web or email, clear Web or Email.
    By default, both Web and Email options are selected and the data stored in myVAULT is used for Web and Email transactions.
  7. Click OK.

To edit data in myVAULT:

  1. Select an item in MyVAULT configuration tab of the Identity Protection Settings window.
  2. Click Edit.
    The Add information to myVAULT window opens.
  3. Change information as necessary.
  4. Click OK.

To remove data from myVAULT:

  1. Select an item in MyVAULT configuration tab of the Identity Protection Settings.
  2. Click Remove.

When finished with the Identity Protection Settings, click Close.

Configuring Trusted Sites

Once Identity Lock is turned on ("Saving Sensitive Information in myVault" on page 69), ZoneAlarm software sends the information stored in your myVAULT account only to trusted sites. Some of those sites are authenticated by ZoneAlarm to make sure they are not fraudulent. They are classified as Security Alliance sites. You can add the sites you trust to the Trusted Sites list. You can also add sites that you do not trust, to which ZoneAlarm software does not send your private data.

To add a site to the Trusted Sites list:

  1. Click in the MOBILITY & DATA panel of the ZoneAlarm software client.
  2. Click Set up in the Identity Protection section.
  3. Select the View Trusted Sites tab.
  4. Click Add.
    The Add Trusted Site window opens.
  5. Enter the URL of a trusted site.
  6. Click OK.
    The new custom site shows in the list of your trusted sites.

By default, each custom site you add has Access and Clear Text Password parameters set to Ask. You can change these settings as necessary.

To change settings for trusted sites:

  1. Select a site from the list.
  2. Click on the Access or the Clear Text Password cell, and select the new setting from the drop-down menu:
    Access
    • Allow - allows the private data saved in your myVAULT account to be sent to this site. This is the default setting for all Security Alliance sites.
    • Ask - asks you if you want to send the private data from your myVault account to this site. This is the default setting for all Custom sites.
    • Deny - stops the private data saved in your myVAULT account from being sent to this site. This is a setting for non-trusted sites.
    Clear Text Password
    • Allow - allows a password saved in your myVAULT account to be sent to this site in clear text. This is the default setting for all Security Alliance sites.
    • Ask - asks you if you want to send a password saved in your myVault account to this site in clear text. This is the default setting for all Custom sites.
    • Deny - stops a password saved in your myVAULT account from being sent to this site in clear text.

To remove a site from the list of trusted sites:

  1. Select a site from the list.
  2. Click Remove.
    The Delete Confirmation window opens.
  3. Click Yes.

When you finish configuring Trusted Sites, click Close.

© Check Point Software Technologies Ltd.

All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice.

RESTRICTED RIGHTS LEGEND:

Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19.

TRADEMARKS:

Refer to the Copyright page http://www.checkpoint.com/copyright.html for a list of our trademarks.

Refer to the Third Party copyright notices http://www.checkpoint.com/3rd_party_copyright.html for a list of relevant copyrights and third-party licenses.