PROTEGENT ENTERPRISE SECURITY SOFTWARE
Protegent Enterprise Security software is developed to protect SME’s and Enterprise data & assets from theft and being misused. Protegent Enterprise Security (PES) works as a Centralized manage software, which manages all the user settings through a Centralized management console. Through the console, policies can be created for each user/department or group for their rights to use. The Centralized Management increases administrative efficiency and reduces management costs to protect IT assets and data.
Brochure Whitepaper
Download Buy Online
Features
Data Leakage Prevention module of Protegent Enterprise Security software allows the administrator to set policy for data transfer w.r.t each user or department to safeguard data/file from unauthorized access. If a user tries to violate his data transfer policy, the administrator gets an alert for the same. Its email filtering feature restricts the user from sending unauthorized emails. Protegent Enterprise Security software also prevents the vital and important data to be transferred from one pc to another device using Flash drive, CD/DVD writers, PCMCIA port, Ethernet ports, Printer ports, Infrared ports and Bluetooth port. It displays an alert as soon as an unauthorized action is performed against the locked ports. PES provides a complete log related to Permanent Blocked, Schedule Blocked or Unblocked Ports with actions performed including change in setting, locking and unlocking of the ports.
Activity Monitoring and Reporting module of Protegent Enterprise Security software enable management to monitor each employee activity on the system as well as on the Internet. This would act as an ideal spy without the knowledge of the user that their every keystroke/activity on the computer or internet is being monitored and the screenshot/report of the same is generated on a regular basis. It helps in increasing the efficiency of each user as they cannot get involved in unproductive work during the working hours. The unique feature of Activity Reporter is to whitelist and blacklist applications which will enable you to monitor more effectively. This module creates a complete working log and sends periodic reports to the server console. The features of Activity Reporter act as a foil for anyone who intends to do any fraudulent activities in the organization.
Asset Management Module of Protegent Enterprise Security software helps the IT department to manage all laptops, desktops and their configurations. Once installed, it tags all hardware and software installed on the system and keeps the track of changes. In case of any change in the system configuration w.r.t hardware or software, an alert is sent to the server console. Its early warning system also keeps the administrator informed about the health of the hard drive. Asset Tracking tool tags and tracks the condition of Software Assets (i.e. Windows Info., Installed Software’s & reports) & Hardware Assets of computers (i.e. Memory, Storage, Printer, Mouse, Keyboard, Hard Disk, Network, Processor, Sound etc.) if any changes occur on the system. This is done by continuous monitoring of various hard disk parameters (such as Hard disk Temperature, S.M.A.R.T and details). Asset tracking provides the feature of Disk Cloning (i.e. it can paste the contents of a potentially fatal disk to a healthy disk) and Disk Scanning (i.e. display bad sectors on hard disks).
DATA LEAKAGE PREVENTION
- Proactive protection against data theft.
- Sets restrictions against all communication ports by blocking and unblocking them.
- Unique feature of White listing the authorized USB by using unique hardware ID of the device.
- Option of assigning USB Read only setting to white listed and non-white listed USB mass storage device.
- Prevent data theft as well as unauthorized access of critical data Locks USB, CD/DVD, IEEE, Network Adaptor, Printer, Infrared port and Bluetooth port.
- Options to open single or multiple ports with authorized password when it is Permanent locked/Idle locked/scheduled locked.
- Option to save software settings so that it can be restored when needed. Option to reset software settings to default.
- Option of reporting system activities through e-mail or by FTP.
- Option of reporting system activities through mail as scheduled (i.e. Daily, Weekly, and Monthly etc.) by user.
- Option of sending Incremental Report or Complete Report as selected by user.
- Unique feature of White listing the authorized USB by using unique hardware ID of the device.
- Special feature of Print Screen Locking.
- Setting of report log size (Min 1 MB to Max 5 MB).
- File Transfer Log will show the reports of file transferred to and from a USB mass storage device & it will also show the detail reports of files added, removed and rename to and from a USB mass storage device.
- E-mail filtering log shows the complete log of the outgoing emails filtered and blocked on the client’s system. Detail includes date and time when the mail was blocked, receiver’s email address (To, Cc, Bcc), attachment name and size, subject of the email and content of body.
ACTIVITY REPORTER
- Captures Application activity, Internet activity, Clipboard, Keystrokes, Screenshots, Working log of clients.
- With the help of application monitor time log can be maintained for specific applications.
- Unique feature of blacklist and white list application
- Blacklist: Applications and websites that are added will get captured and be visible in alert.
- White list: No alert will be generated of the application and website added in the white list.
- Option to select the level of tracking.
- Send the reports to a specific email address or upload to an FTP location.
- Password protected so only authorized person can access the reports. Runs in Absolutely invisible mode.
- Records contents of password protected web pages, including Web Mail messages.
- Monitors all users on a PC, even if you don't know their passwords.
- Monitors Windows Clipboard activities like copy and cut.
- Monitors computer activity only when user goes online (optional).
- Setting of report log size (Min 1 MB to Max 5 MB).
- Captures ICQ, Miranda, Skype, Google Talk, MSN, AIM, AOL, Yahoo, QIP chats.
- Detection and notification of the custom keywords (alerts).
- Reports of Application activity, Clipboard activity, working log, Internet activity, Keystrokes, Screenshots all in HTML format.
- Intercepts DOS-box and Java-chat keystrokes.
- Invisible in the Windows startup list.
PC REPORTER (ASSET TAGGING & TRACKING)
- Tags & Track Hardware Assets i.e. Motherboard, Memory, Printer, Mouse, Keyboard, Hard Disk, Network, Processor, Sound etc. If any changes in hardware occur then auto message sending feature on server.
- Tags & Track Software Assets i.e. operating system Info, Installed Programs. Auto message sending on server with respect to software changes.
- Real time hard drive status monitoring.
- Avoid losing your important data due to hard drives overheating.
- Hard drive health status information.
- Amount of bad blocks or physical bad sectors on the hard drives.
- S.M.A.R.T. attributes.
- Disks scan option to check physical bad sectors.
- Disk Cloning option to take the back up of the hard disk.
- Prompts emergency system shutdown in case of hard drive overheating.
- Previewing raw values of S.M.A.R.T.
- Setting of report log size (Min 1 MB to Max 5 MB).
- Alert if changes encountered in Hardware Assets & Software Assets.
- Hard disk real time temperature with respect to time graph.
- Email alert for S.M.A.R.T & Asset Tracking.
- Schedule feature.
Components
- Data Leakage Prevention
- Activity Reporter
- PC Reporter
Why Protegent Enterprise Security?
- Customized central management tool
- Centralized management of port access and user control
- Automatic generation of database to store monitored activities
- Optimized for Business Environments
- Remotely manage the data prevention of multiple systems from a single location by blocking and unblocking ports
- There is comprehensive customizable reporting for all modules/components which can be exported to HTML format.
- Enterprises may choose the components to suit their requirements.