Complete Endpoint Management - tecsols.com › en › wp-content › uploads › tec › 02 › doc...
Transcript of Complete Endpoint Management - tecsols.com › en › wp-content › uploads › tec › 02 › doc...
Control Record Audit
Complete Endpoint Management
COMPUTEX Taipei 2010Best Choice Award
CNET Editors ' Rating4.5 stars
System Requirements
Processor: Dual-Core 2.0 GHzMemory: 4 GBFree Disk Space: 50GB
Processor: Pentium 4 1.3GHzMemory: 1 GBFree Disk Space: 10GB
Database
Server
Console
Agent
Components Hardware RequirementsSoftware Requirements
SQL Server 2005 SP1 / 2008 / 2008 R2 / 2012 / 2014
Windows Server 2003 SP1 / 2008 / 2008 R2 / 2012 / 2012 R2
Windows XP / Vista / 7 / 8.x / 10Windows Server 2003 / 2008 / 2008 R2 / 2012 / 2012 R2
Windows XP / Vista / 7 / 8.x / 10Windows Server 2003 / 2008 / 2008 R2 / 2012 / 2012 R2
Processor: Pentium 4 1.3GHzMemory: 1 GBFree Disk Space: 40GB
IP-guard Main Feature
Record various types of endpoint workstation operation and activities according to the defined policies. Endpoint workstation’s hardware and software asset changes and screen history are also included
Active Recording :
Manage endpoint workstation operation activities, software and hardware assets, remote control and maintenance via one single console
Total Control :
Automatically analyse endpoint workstation's usage and provide various types of statistics and reports. Reports also include Windows update information, Windows vulnerability and software license information
Complete Auditing :
TELFAXMAIL
+886 2 7720-7888+886 2 [email protected]@tecsols.com
TEC Solutions Limitedwww.tecsols.com
Copyright © 2000-2016 TEC Solutions Limited. All Rights Reserved.
Automatically collect endpoint computer information and provide accurate asset information
Remote maintenance reduces travel cost
14 Modules to completely safe guard corporate environment
Comprehensive logs help to identify user behavior and audit
Flexible product design
Background Recording
Easy to use interface reduces administrator work load
Cross exam screen history with event logs
Effectively control various types of external devices including Floppy, CD/DVD Rom drives, parallel port, USB, HUB, SCSI interface, 1394 controller, infrared, Bluetooth, modem, wireless network cards, USB mouse and keyboard, portable device etc.Ability to control a device by device nameProhibit end user adding any new device
Device Management.
.
.
Ability to restrict user access to USB storage devices Encrypt files when copied onto USB storage devicesFormat any USB device into an IP-guard encrypted device Provide removable device connect and disconnect activity log
Removable Storage Management.
.
.
.
Remote MaintenanceSoftware uninstall feature allows administrators to remove suspicious softwareRemotely manage and troubleshoot end user computers in order to reduce system downtime
.
.
Immediate response to unexpected mattersMonitor up to 16 screens at onceTrigger screen recording by application Screen history can be retrieved by event log
Screen Monitoring.
.
.
.
Supports over 40 different types of Web browser Control browsing behavior and prevent end users uploading sensitive information (HTTP/FTP)Understand end users browsing pattern and improve productivity
Website Management.
.
.
TEC Solutions Limited
Ability to set policies in order to prevent information leakageAbility to back up full email content and attachmentsSupports Webmail/Microsoft Exchange/Lotus note and standard mail protocols
Email Management.
.
.
Remote computers can be categorized by user name or computer nameEffectively prevent changing of system settings, IP/MAC addressesProvide category management and alert feature
Basic Management.
.
.
Effectively control and manage hardware and software asset informationUninstall software on endpoint computers from our console Automatically perform Windows updates and vulnerability checks
Asset Management.
.
.
Prevent data leakage by blocking unauthorised printing Printed content stored in JPG format, provides un-changeable format for future auditEffective way to reduce print costs and prevent wasting of printer resources
Print Management.
.
.
Supports up to 22 different types of Instant Message applications Automatic backup on file sent via Instant Message applicationControl Instant Message file sharing activities
Instant Message Management .
.
.
Restrict or limit IM, P2P and any other related applicationsRestrict or limit use of “green” softwareApplication will remain restricted or limited even if windows registry, file name or path has been altered
Application Management.
.
.
Restrict document access rights by computer, user name, disk type, path, application or time zoneRecord document operation activities for future auditsBack up before delete, modify, copy to ensure document safety
Document Management.
.
.
Control and monitor internet, intranet and custom network range traffic flowControl traffic flow to prevent network traffic congestion caused by excessive downloading or uploading
Bandwidth Management.
.
Network ManagementManage and control network packages to prevent Trojan/Virus specific network protocolsIntrusion Detection and Intrusion PreventionBlock specific groups of users to ensure network safety
.
.
.
When facing the ever evolving threat to secure information security, organisations need an effective tool to build a secure and efficient network environment. IP-guards total control, comprehensive logs and efficient auditing will minimise corporate operational risks and create a safer network environment.
IP-guard focuses on endpoint information security by monitoring and controlling endpoint computer asset information, event logs and behavior. IP-guard provides a high performance, reliable, automated and easy to use system that captures and controls employee information leakage under any circumstances which allows administrators to secure and control the corporate environment.
Control‧Record‧AuditThe Complete Solution to Endpoint Security
IP-guards 14 modules are a comprehensive management solution to counter all problems endpoint computers may encounter, and are also a cost effective way to gain control over endpoint computers within an enterprise.
AuditView statistic
and Report
RecordAuto record and
comprehensive logs
ControlTotal control of end
user behavior
IP-guards 14 modules are a comprehensive management solution to counter all problems endpoint computers may encounter, and are also a cost effective way to gain control over endpoint computers within an enterprise.
IP-guardThe Enterprise Endpoint Security Solution
Basic Information, Basic Control, Event Alerts, Basic Policy, Policy Logs, Event Logs, Desktop Security Management
Application Logs, Application Statistics, Application Usage Control, Software Installation Management
Web Logs, Website Statistics, Website Control, Upload Control
Traffic Statistics, Bandwidth Control
Document Operation Logs, Document Operation Control, Document Backup, Share Folder Operation Logs
Print Logs, Printed Content Recording, Print Control, Print Watermarks
Instant Screen Snapshot, Multi-screen Monitoring, Screen History Playback
Remote Maintenance, Remote Control, Remote File Transfer, Software Uninstall
Device Control
Network Communication Control, Intrusion Detection
Email Logs, Email Control
Instant Messaging Logs, Instant Message Document Transfer Control
Asset / Software License / Windows Patch/Vulnerability Management and Software Deployment, Software Uninstall
Authorize Removable Device, Encrypt Removable Device
IP-guard Functionality DescriptionBasic Management
Application Management
Website Management
Bandwidth Management
Document Management
Print Management
Screen Monitoring Management
Remote Maintenance
Device Management
Network Management
Email Management
Instant Message Management
Asset Management
Removable Device Management
Included in Desktop Security ManagementNote: Support Terminal Server, Thin Client, Multi-screen Computer and Safe Mode
Endpoint Information Security M
anagement System