Welcome!

News Feed Item

AVG Announces the Availability of AVG Zen™

So many devices, so little time - AVG makes security simpler in today's hyper-connected world

AMSTERDAM AND SAN FRANCISCO, March 31, 2014 /CNW/ - AVG Technologies N.V. (NYSE: AVG), The Online Security Company™ for 177 million active users, today announced the availability of AVG Zen™ in Canada, Germany, Spain, the United Kingdom and the United States of America. AVG Zen is a new application for Windows® PCs and Android™ smartphones and tablets that significantly simplifies the way in which users can control their protection, performance and privacy settings. With its ease of discovery and deployment across consumers' connected devices, AVG Zen helps people make quick and informed decisions from one place, making it simple to keep their devices and data protected in a hyper-connected world.

Yuval Ben-Itzhak, Chief Technology Officer, AVG Technologies explained, "The idea behind AVG Zen is to make our online lives easier. With more connected devices around us than ever before, the challenge of keeping everything protected from theft, free of malware, optimized and private becomes more complex. This is why we are introducing AVG Zen. With AVG Zen, users can see at a glance the real-time status of all the connected devices and take proactive, corrective measures as required. As our life is becoming more and more connected with new technologies like wearables and smart sensors, I can even see a future where AVG Zen might alert me when my child becomes ill or my home alarm stops working."

While technology has made it easier to do many things, whether booking a holiday or sorting out family finances, the pressure on people to make sure their devices are protected, performing at their best and kept private, has never been higher. AVG Zen gives consumers a quick view of changes they could make to tackle these everyday issues, such as showing some of the steps a parent could take to maintain their child's privacy settings on a tablet, simple ways to make sure the antivirus solution on a smartphone is always up to date, or suggestions on how to maximize the battery life on the family laptop.

AVG Zen is available for core products, including AVG® Internet Security, AVG PC TuneUp®, AVG PrivacyFix™, AVG Antivirus for Android™, AVG Cleaner for Android™, AVG PrivacyFix for Android™ and AVG Zen Admin for Android ™ apps from Google Play™. The AVG Zen application displays a circle that changes color and level of completeness according to the level of security for each of the focus areas of protection, performance, privacy and support. Users simply log on to their AVG account to start the application and click through to view the status of their own devices. They can also send email invites to add other devices to their AVG Zen network.

Quick steps to getting AVG Zen
1. Download AVG Zen for free online from either www.avg.com/zen or the Google Play app store https://play.google.com/store/apps/details?id=com.avg.zen

While currently available for monitoring only, AVG Zen users can look forward to additional functionality later this year that, among other things, will enable them to update devices remotely with the appropriate AVG protection, performance and privacy services.

About AVG Technologies (NYSE: AVG)

AVG is the online security company for devices, data and people.  AVG's mission is to simplify, optimize and secure the Internet experience, providing peace of mind in a connected world. By choosing AVG's software and services, users become part of a trusted global community that benefits from inherent network effects, mutual protection and support. AVG has grown its user base to 177 million active users as of December 31, 2013 and offers a protection, performance and privacy products and services suite to consumers and small businesses including Internet security, performance optimization, mobile security, online backup, identity protection and family safety software.

Android™ and Google Play™ are trademarks of Google, Inc. Windows® is a registered trademark of Microsoft, Inc. All other trademarks are the property of their respective owners.

www.avg.com 

SOURCE AVG Technologies

Image with caption: "AVG Technologies (CNW Group/Marshall Fenn Communications Ltd.) (CNW Group/AVG Technologies)". Image available at: http://photos.newswire.ca/images/download/20140331_C7865_PHOTO_EN_38613.jpg

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
SYS-CON Events announced today that Ericsson has been named “Gold Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. Ericsson is a world leader in the rapidly changing environment of communications technology – providing equipment, software and services to enable transformation through mobility. Some 40 percent of global mobile traffic runs through networks we have supplied. More than 1 billion subscribers around the world re...
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
SYS-CON Events announced today that Peak 10, Inc., a national IT infrastructure and cloud services provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Peak 10 provides reliable, tailored data center and network services, cloud and managed services. Its solutions are designed to scale and adapt to customers’ changing business needs, enabling them to lower costs, improve performance and focus inter...
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
We’ve worked with dozens of early adopters across numerous industries and will debunk common misperceptions, which starts with understanding that many of the connected products we’ll use over the next 5 years are already products, they’re just not yet connected. With an IoT product, time-in-market provides much more essential feedback than ever before. Innovation comes from what you do with the data that the connected product provides in order to enhance the customer experience and optimize busi...
SYS-CON Events announced today the Docker Meets Kubernetes – Intro into the Kubernetes World, being held June 9, 2016, in conjunction with 18th Cloud Expo | @ThingsExpo, at the Javits Center in New York, NY. Register for 'Docker Meets Kubernetes Workshop' Here! This workshop led by Sebastian Scheele, co-founder of Loodse, introduces participants to Kubernetes (container orchestration). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, participants learn ...
Peak 10, Inc., has announced the implementation of IT service management, a business process alignment initiative based on the widely adopted Information Technology Infrastructure Library (ITIL) framework. The implementation of IT service management enhances Peak 10’s current service-minded approach to IT delivery by propelling the company to deliver higher levels of personalized and prompt service. The majority of Peak 10’s operations employees have been trained and certified in the ITIL frame...
The increasing popularity of the Internet of Things necessitates that our physical and cognitive relationship with wearable technology will change rapidly in the near future. This advent means logging has become a thing of the past. Before, it was on us to track our own data, but now that data is automatically available. What does this mean for mHealth and the "connected" body? In her session at @ThingsExpo, Lisa Calkins, CEO and co-founder of Amadeus Consulting, will discuss the impact of wea...
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists will dis...
See storage differently! Storage performance problems have only gotten worse and harder to solve as applications have become largely virtualized and moved to a cloud-based infrastructure. Storage performance in a virtualized environment is not just about IOPS, it is about how well that potential performance is guaranteed to individual VMs for these apps as the number of VMs keep going up real time. In his session at 18th Cloud Expo, Dhiraj Sehgal, in product and marketing at Tintri, will discu...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, will provide tips on how to be successful in large scale machine lear...
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights. At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
Digital payments using wearable devices such as smart watches, fitness trackers, and payment wristbands are an increasing area of focus for industry participants, and consumer acceptance from early trials and deployments has encouraged some of the biggest names in technology and banking to continue their push to drive growth in this nascent market. Wearable payment systems may utilize near field communication (NFC), radio frequency identification (RFID), or quick response (QR) codes and barcodes...