IP Security Premium is similar to IP Security.
The differences are:
-IP organisation and geographical information. For example: do you have a doubt with a web site? The web site is not in your country? Or worse you live in the US and the web site is in China or Kazakhstan? The IP security traceroute functionality will confirm if you have a risk.
-New security features: they will be available first in the premium version. For example the geographical and analysis information in Packet Inspection.
-Faster response times for supportFirstly, Network Protection is a combination of tools to help you to understand your network’s configuration, any potential issues, the availability of the network and its performance.
The second set of features focuses on security in order to check if your users are vulnerable. Understanding the network and the security is crucial to knowing if you are at risk and where the attacks may come from.The network function shows the list of WiFi access points, the one which you are registered to, and all the IP information (IP address facing the internet, DNS, DHCP, etc…).Network Protection offers both a graphical speed test over the internet and a ping mode to easily check the availability of both the router and the servers on the internet.Network Protection has a discovery mode with an accurate graphical representation of the devices discovered. It easily allows you to validate the devices that are connected on the network. The user interface is especially easy to use. Every device in the list can be selected to perform a ports scan to check which application is susceptible of transporting an attack.Furthermore, to the above-mentioned security function, there are several unique security modules:o Bad web sites: by surfing the internet, or by accessing a phishing email by mistake, the risk that the user accesses a malware web site (that will want to steal money from them) is high. Network Protection tests if you have the right measures in place to protect the users.o Malware: this safely shows you what happens if you connect to a malware web site. By clicking on a session in a list, you can discover the city where the malware site is hosted.o Packet Inspection: this is a real time capture of the traffic for inspection and analysis. A malware and botnets Command & Control search is assessed on the traffic.o Phishing: this is an educational test for your users to find out if they are ready to detect abnormal characteristic in a phishing email.
o Backup: what would you do if a disk crashed or your PC was stolen? This list of questions helps to validate the measures you’ve put in place to protect your most critical data.