Technical Support Technical Support
SafenSoft
Solutions chevron-down
Products chevron-down
Projects chevron-down
Partners chevron-down
About us chevron-down

SysWatch Workstation PLUS

SysWatch Workstation PLUS provides antimalware protection basing on proactive technologies and includes a built-in antivirus scanner. The software effectively protects workstations against all kinds of malicious software, hacker attacks, and unauthorized user actions and incorporates centralized management and endpoint protection policy configuration capabilities.
Trial version

Overview

SysWatch Workstation takes a different approach to antimalware protection than traditional antimalware, controlling application launch and activity to maintain system integrity, even through patching and update cycles.

SysWatch blocks hidden and unknown application launches, effectively preventing malware or unwanted application activity. Because SysWatch Workstation PLUS does not need to identify individual threats in order to block them, it doesn’t need the frequent signature updates required by traditional antimalware to provide reliable protection against zero-day threats and hacker attacks.

The SysWatch Workstation PLUS antivirus scanner is provided to enable scanning of unknown applications for malware using a combination of signatures and heuristic analysis. Depending on the results of the scan, administrators can decide whether to launch the application in a sandbox or without restrictions. It can also be used to scan external devices for malware prior to allowing those devices to connect to the network.

Application activity rules can be adjusted as required to prevent data leaks or to manage the effective usage of employees’ time, for example, by preventing certain applications from running or restricting access to file system or external devices.

Here’s how SysWatch Workstation PLUS antimalware protection works:

Proactive antimalware protection against all kinds of malicious software and hacker attacks

Dynamic integrity control

Controls application launches, blocking the launch of hidden applications, and preventing new applications from launching until the administrator can determine whether the application should be permitted to run.

Dynamic sandbox

Unknown or potentially dangerous applications are launched in a limited user account or a sandbox , so they cannot affect other processes or the system itself. This method allows malicious activity to be blocked before patches or signature updates can be applied.

Application activity control

Controls how different applications can access files and folders, USB drives, registry keys, external devices, and network resources. User-driven rules can be created to control application activity.

Antivirus scanner

SysWatch Workstation PLUS has a built-in antivirus scanner that enables scanning of files for known malicious code and repairing of infected files where possible. It also enables administrators to scan unknown applications before launching them and to perform regular system scans if required.

Targeted software protection

Enables custom protection to be implemented for specific software in the following ways:

  • Application data protection. Disable read/write access to application data files and registry keys for all other applications.
  • Application consistency control. Control over program code changes ensures that applications cannot be launched if the executable code has been modified.
  • Application executable code protection. Prevent executable modules from being modified by other applications.

User activity control and data loss prevention

Application launch control

Block attempts by users to launch any unknown application or block only specified unwanted software such as games or multimedia players.

Access to files and folders

Set access rules to files and folders for individual applications or groups of applications. Active Directory support enables rules to be set for individual users or groups of users.

Time-limited rules

When setting application activity policies, access rules can be time-limited to allow for workstation maintenance.

Access to peripheral devices

Granular settings control access to USB drives and CD/DVD devices, down to the level of device type, name, vendor and ID.

Restore

Logging history of changes of certain application allows restoration of files changed by that application.

Self-protection system

Permits only authorized users to connect, stop or uninstall client application. All changes and uninstallation are password protected, ensuring only designated users can allow or deny access to designated files and folders or change other settings.

Cutting edge technologies

SysWatch is built around SoftControl’s unique, patent-pending V.I.P.O. (Valid Inside Permitted Operations) technology, which combines three levels of protection:

D.I.C. (Dynamic Integrity Control)

Protects all executable software on the system by detecting any unauthorized activation attempt and preventing the process from launching before damage can occur. Preserves the system in a known-good state.

D.S.E. (Dynamic Sandbox Execution)

Specially-designated user account for potentially dangerous software provides system-level privilege controls to block malicious software activity. Also protects the PC from software vulnerabilities.

D.R.C. (Dynamic Resource Control)

Controls how different applications can access files and folders, registry keys, external devices, and network resources.

Easy to deploy and manage

Scalability

Easily scales to meet the needs of growing businesses.

Integration with other security solutions

Operates alongside and can be integrated with other security and network management tools, such as SIEM, IAM, network traffic security, encryption, and traditional antimalware solutions.

Centralized management

Update server

SysWatch Workstation installations can be updated through local server connections.

Remote management

The built-in remote management console supports remote installation and uninstallation, policy and configuration changes.

Incident management

The management console enables administrators to remotely make decisions on action to be taken in case of incidents such as attempts to launch unknown applications or breach of security policy or to process incidents automatically.

Key features

  • Protects all executable software on the system by detecting any unauthorized activation attempt and preventing the process from launching before damage can occur.
  • Granular application launch control settings allow precise controls and prevent unknown processes from launching, blocking malicious activity without the need for software patches or signature updates.
  • Controls how different applications can access files and folders, USB drives, CD/DVD, COM and LPT ports, registry keys, external devices, and network resources. User-driven rules can be created to control application activity.
  • When setting application activity policies, access rules can be time-limited to allow workstation maintenance to be scheduled.
  • Detection and prevention of VB and JavaScript scripting language launches.
  • Launch of unknown or potentially dangerous applications is performed in a sandbox, so other processes and the system itself cannot be affected.
  • The remote Admin Explorer console enables administrators to remotely make decisions on incidents such as attempts to launch unknown applications or breach of security policy or to process incidents automatically.
  • Only authorized users are permitted to connect, stop, or uninstall client application. All changes and uninstallation are password-protected, and only designated users can allow or deny access to designated files and folders or change other settings.
  • Application change history is logged to enable the restoration of files changed by that application.
  • Operates alongside and can be integrated with other security and network management tools, such as SIEM, IAM, network traffic security, encryption, and traditional anti-malware solutions.
  • Supports the use of a local server for program component updates on workstations.
  • Built-in remote management console allows remote installation, uninstallation, and or changes to SysWatch settings.
  • The management console enables administrators to remotely determine actions to be taken on incidents such as attempts to launch unknown applications or breach of security policy or to process incidents automatically.

Products News

line-72px-2px

There are no articles for this section

All news →
Новости