complete endpoint management - tecsols.com › en › wp-content › uploads › tec › 02 › doc...

2
Control Record Audit Complete Endpoint Management COMPUTEX Taipei 2010 Best Choice Award CNET Editors' Rating 4.5 stars System Requirements Processor: Dual-Core 2.0 GHz Memory: 4 GB Free Disk Space: 50GB Processor: Pentium 4 1.3GHz Memory: 1 GB Free Disk Space: 10GB Database Server Console Agent Components Hardware Requirements Software Requirements SQL Server 2005 SP1 / 2008 / 2008 R2 / 2012 / 2014 Windows Server 2003 SP1 / 2008 / 2008 R2 / 2012 / 2012 R2 Windows XP / Vista / 7 / 8.x / 10 Windows Server 2003 / 2008 / 2008 R2 / 2012 / 2012 R2 Windows XP / Vista / 7 / 8.x / 10 Windows Server 2003 / 2008 / 2008 R2 / 2012 / 2012 R2 Processor: Pentium 4 1.3GHz Memory: 1 GB Free Disk Space: 40GB IP-guard Main Feature Record various types of endpoint workstation operation and activities according to the defined policies. Endpoint workstation’s hardware and software asset changes and screen history are also included Active Recording : Manage endpoint workstation operation activities, software and hardware assets, remote control and maintenance via one single console Total Control : Automatically analyse endpoint workstation's usage and provide various types of statistics and reports. Reports also include Windows update information, Windows vulnerability and software license information Complete Auditing : TEL FAX MAIL +886 2 7720-7888 +886 2 7720-7858 [email protected] [email protected] TEC Solutions Limited www.tecsols.com Copyright © 2000-2016 TEC Solutions Limited. All Rights Reserved. Automatically collect endpoint computer information and provide accurate asset information Remote maintenance reduces travel cost 14 Modules to completely safe guard corporate environment Comprehensive logs help to identify user behavior and audit Flexible product design Background Recording Easy to use interface reduces administrator work load Cross exam screen history with event logs

Upload: others

Post on 08-Jun-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Complete Endpoint Management - tecsols.com › en › wp-content › uploads › tec › 02 › doc › ... · COMPUTEX Taipei 2010 Best Choice Award CNET Editors' Rating 4.5 stars

Control Record Audit

Complete Endpoint Management

COMPUTEX Taipei 2010Best Choice Award

CNET Editors ' Rating4.5 stars

System Requirements

Processor: Dual-Core 2.0 GHzMemory: 4 GBFree Disk Space: 50GB

Processor: Pentium 4 1.3GHzMemory: 1 GBFree Disk Space: 10GB

Database

Server

Console

Agent

Components Hardware RequirementsSoftware Requirements

SQL Server 2005 SP1 / 2008 / 2008 R2 / 2012 / 2014

Windows Server 2003 SP1 / 2008 / 2008 R2 / 2012 / 2012 R2

Windows XP / Vista / 7 / 8.x / 10Windows Server 2003 / 2008 / 2008 R2 / 2012 / 2012 R2

Windows XP / Vista / 7 / 8.x / 10Windows Server 2003 / 2008 / 2008 R2 / 2012 / 2012 R2

Processor: Pentium 4 1.3GHzMemory: 1 GBFree Disk Space: 40GB

IP-guard Main Feature

Record various types of endpoint workstation operation and activities according to the defined policies. Endpoint workstation’s hardware and software asset changes and screen history are also included

Active Recording :

Manage endpoint workstation operation activities, software and hardware assets, remote control and maintenance via one single console

Total Control :

Automatically analyse endpoint workstation's usage and provide various types of statistics and reports. Reports also include Windows update information, Windows vulnerability and software license information

Complete Auditing :

TELFAXMAIL

+886 2 7720-7888+886 2 [email protected]@tecsols.com

TEC Solutions Limitedwww.tecsols.com

Copyright © 2000-2016 TEC Solutions Limited. All Rights Reserved.

Automatically collect endpoint computer information and provide accurate asset information

Remote maintenance reduces travel cost

14 Modules to completely safe guard corporate environment

Comprehensive logs help to identify user behavior and audit

Flexible product design

Background Recording

Easy to use interface reduces administrator work load

Cross exam screen history with event logs

Page 2: Complete Endpoint Management - tecsols.com › en › wp-content › uploads › tec › 02 › doc › ... · COMPUTEX Taipei 2010 Best Choice Award CNET Editors' Rating 4.5 stars

Effectively control various types of external devices including Floppy, CD/DVD Rom drives, parallel port, USB, HUB, SCSI interface, 1394 controller, infrared, Bluetooth, modem, wireless network cards, USB mouse and keyboard, portable device etc.Ability to control a device by device nameProhibit end user adding any new device

Device Management.

Ability to restrict user access to USB storage devices Encrypt files when copied onto USB storage devicesFormat any USB device into an IP-guard encrypted device Provide removable device connect and disconnect activity log

Removable Storage Management.

Remote MaintenanceSoftware uninstall feature allows administrators to remove suspicious softwareRemotely manage and troubleshoot end user computers in order to reduce system downtime

Immediate response to unexpected mattersMonitor up to 16 screens at onceTrigger screen recording by application Screen history can be retrieved by event log

Screen Monitoring.

Supports over 40 different types of Web browser Control browsing behavior and prevent end users uploading sensitive information (HTTP/FTP)Understand end users browsing pattern and improve productivity

Website Management.

TEC Solutions Limited

Ability to set policies in order to prevent information leakageAbility to back up full email content and attachmentsSupports Webmail/Microsoft Exchange/Lotus note and standard mail protocols

Email Management.

Remote computers can be categorized by user name or computer nameEffectively prevent changing of system settings, IP/MAC addressesProvide category management and alert feature

Basic Management.

Effectively control and manage hardware and software asset informationUninstall software on endpoint computers from our console Automatically perform Windows updates and vulnerability checks

Asset Management.

Prevent data leakage by blocking unauthorised printing Printed content stored in JPG format, provides un-changeable format for future auditEffective way to reduce print costs and prevent wasting of printer resources

Print Management.

Supports up to 22 different types of Instant Message applications Automatic backup on file sent via Instant Message applicationControl Instant Message file sharing activities

Instant Message Management .

Restrict or limit IM, P2P and any other related applicationsRestrict or limit use of “green” softwareApplication will remain restricted or limited even if windows registry, file name or path has been altered

Application Management.

Restrict document access rights by computer, user name, disk type, path, application or time zoneRecord document operation activities for future auditsBack up before delete, modify, copy to ensure document safety

Document Management.

Control and monitor internet, intranet and custom network range traffic flowControl traffic flow to prevent network traffic congestion caused by excessive downloading or uploading

Bandwidth Management.

Network ManagementManage and control network packages to prevent Trojan/Virus specific network protocolsIntrusion Detection and Intrusion PreventionBlock specific groups of users to ensure network safety

When facing the ever evolving threat to secure information security, organisations need an effective tool to build a secure and efficient network environment. IP-guards total control, comprehensive logs and efficient auditing will minimise corporate operational risks and create a safer network environment.

IP-guard focuses on endpoint information security by monitoring and controlling endpoint computer asset information, event logs and behavior. IP-guard provides a high performance, reliable, automated and easy to use system that captures and controls employee information leakage under any circumstances which allows administrators to secure and control the corporate environment.

Control‧Record‧AuditThe Complete Solution to Endpoint Security

IP-guards 14 modules are a comprehensive management solution to counter all problems endpoint computers may encounter, and are also a cost effective way to gain control over endpoint computers within an enterprise.

AuditView statistic

and Report

RecordAuto record and

comprehensive logs

ControlTotal control of end

user behavior

IP-guards 14 modules are a comprehensive management solution to counter all problems endpoint computers may encounter, and are also a cost effective way to gain control over endpoint computers within an enterprise.

IP-guardThe Enterprise Endpoint Security Solution

Basic Information, Basic Control, Event Alerts, Basic Policy, Policy Logs, Event Logs, Desktop Security Management

Application Logs, Application Statistics, Application Usage Control, Software Installation Management

Web Logs, Website Statistics, Website Control, Upload Control

Traffic Statistics, Bandwidth Control

Document Operation Logs, Document Operation Control, Document Backup, Share Folder Operation Logs

Print Logs, Printed Content Recording, Print Control, Print Watermarks

Instant Screen Snapshot, Multi-screen Monitoring, Screen History Playback

Remote Maintenance, Remote Control, Remote File Transfer, Software Uninstall

Device Control

Network Communication Control, Intrusion Detection

Email Logs, Email Control

Instant Messaging Logs, Instant Message Document Transfer Control

Asset / Software License / Windows Patch/Vulnerability Management and Software Deployment, Software Uninstall

Authorize Removable Device, Encrypt Removable Device

IP-guard Functionality DescriptionBasic Management

Application Management

Website Management

Bandwidth Management

Document Management

Print Management

Screen Monitoring Management

Remote Maintenance

Device Management

Network Management

Email Management

Instant Message Management

Asset Management

Removable Device Management

Included in Desktop Security ManagementNote: Support Terminal Server, Thin Client, Multi-screen Computer and Safe Mode

Endpoint Information Security M

anagement System