Solutions to block PC information leaks and manage weak points
Control portable storage devices, ports, devices, networks effectively, manage the history of blocked access to protect key info assets, and keep track of attempts for unnecessary use.
Control and collect information of complete domains as an integrated domain console structure. Also, simply operate and control your PC security, vaccines, patches, current status management.
A simple and automated action, one-click action remove hassles, and support an integrated analytics for weak points and actions to address them.
Support an easy and automated control over login passwords, shared folders, access URL management, and vaccine use from a central system.
Control devices, which are potentially used for a leakage path by being connected to storage device wireless/wired such as USB Memory, portable HDD, network drives, cameras, smartphones, and scanners.
Manage the history of access/use of USB modem, WIFI, Access Point (AP), Ad-Hoc, and control/manage users’ patterns and attempts to leak information in advance.
Check whether to apply an encryption management, shared folder, network drive access, vaccine/security patches, manage their settings automatically, and support functions to detect and resolve security weakness on their own.
Manage security policy in detail according to IP bandwidth, purpose of use, endpoints. Also, find the existence of inside network, distinguish inside and outside networks to set policy for management.
Block information leaks by controlling storage medium
USB memory, external HDD and other device management functions allow an authorized access only, manage three-stage control, exception policy per division/PC and the history of blockage, thus identify any attempts to leak and control them.
Automatic control and security inspection for PC weakness
Automatically recognize and control the status of applying PC’s accounts/screen savers/vaccines/shared folders/virtual OS to manage and inspect the history of unnecessary access to Internet sites and URL use logging, thus managing and inspecting PC’s weakness.
Status of PC Software and Hardware
Provide materials for PC Software/Hardware composition, status in detail, various statistics (performance, model, capacity etc.), and mange weakness.