Technical Support Technical Support
Solutions chevron-down
Products chevron-down
Projects chevron-down
Partners chevron-down
About us chevron-down

TPSecure Teller

A special version of TPSecure Teller is designed to protect jobs of employees frontoffice bank (tellers, cash). Using TPSecure Teller allows you to build an effective system of protection against external (malicious software, hackers) and internal threats (insiders, disgruntled employees) to ensure the integrity of the system and data protection.
Free trial


TPSecure Teller is an effective protection for workstations with installed specialized software (client ABS, ASR, etc.). TPSecure controls startup and application activity, that ensuring the integrity of software during operation and maintenance of the system in the last good state. Because of this, the decision is up to date and effective against all types of malware, hacker attacks and against the unwanted actions by safety applications.

The system user-defined rules of application activity, file system access, peripherals and network resources along with a monitoring and logging provide the ability to control and prevent malicious or careless actions of preventing change the settings and configuration of the system and providing data security. The ability to centrally manage and modularity of the system allows to reduce the costs of administration.

Why TPSecure Teller?

Specialized functions for the protection of workstations bank employee

Application launch control

Block attempts by users to launch any unknown application, or only specified applications such as games or multimedia players. Updates are installed automatically.

Access to peripheral devices

Granular settings control access to USB drives, CD/DVD devices with the ability to disable auto-configaration and exclusions (by device type, name, manufacturer, ID). In addition, it is possible to block all CD / DVD media except protected and set access rules for COM, LPT ports.

Monitoring and logging

All operations on access and copying of data, including copying on external devices, and data input from the keyboard, are traced and logged with possibility of obtaining notices on certain actions. Presence of the module of monitoring is hidden from the user.

Self-protection system

Nobody, except the authorized administrators, can be connected, stop or remove the client application, even with the rights of the local administrator.

Time-limited rules

When setting application activity policies, access rules can be time-limited to allow for workstation maintenance.


Logging history of changes of certain application allows restoration of files changed by that application.

Maintaining the accounting of the e-mails sent by the employee

It’s possible to track of employee’s transfer of information outside. The name of the attached files is logged when sending email to MS Outlook 2003.

Remote display screen shot session

Remote screen shot session of user’s workstation display in real time as part of a forensic investigation.

Record keyboard input

Record all keyboard input for any application in order to track who, when and what data is entered.

Monitoring of use of external USB stores

Allows to know what files and when were copied by the employee on the USB device or what files and applications were opened from the USB store (operation of reading, record, removal of files).

Monitoring of the files sent to print

Allows to trace and log the facts of sending documents on the press by the employee.

Monitoring of the system register

Allows to trace the changes of the system register which are carried out by the employee or appendices (operations of reading, creation, removal, renaming, change of keys).

Shadow copy for changed files

Automatically saves original copies of changed or deleted files and system registry keys.

Data security from unauthorized access and change software

Dynamic Integrity Control

Protects all executable software on the system by detecting any unauthorized activation attempt and preventing the process from launching before damage can occur.

Dynamic Sandbox

Specially-designated user account for potentially vulnerable software provides system-level privilege controls to block dangerous software activity

Dynamic Resource Control

Controls how different applications can access files and folders, registry keys, external devices, and network resources. User-driven rules can be created to control application activity.

Targeted software protection

Enables custom protection to be implemented for specific software in the following ways:

  • Application consistency control. Control over program code changes ensures that applications cannot be launched if the executable code has been modified.
  • Application executable code protection. Prevent executable modules from being modified by other applications.
  • Application data protection. Disable read/write access to application data files and registry keys for all other applications.

Control of efficiency of working hours by employees

System of the accounting of working hours of the employee

Necessary information for the personnel department of the company and also for heads. Allows to reduce expenses, effectively using a manpower of the company and controlling discipline of employees.

Usage monitoring

Keep track of who uses which applications as well as the time spent using those applications.

Cutting edge technologies

SysWatch is built around SoftControl’s unique, patent-pending V.I.P.O. (Valid Inside Permitted Operations) technology, which combines three levels of protection:

D.I.C. (Dynamic Integrity Control)

Protects all executable software on the system by detecting any unauthorized activation attempt and preventing the process from launching before damage can occur. Preserves the system in a known-good state.

D.S.E. (Dynamic Sandbox Execution)

Specially-designated user account for potentially dangerous software provides system-level privilege controls to block malicious software activity. Also protects the PC from software vulnerabilities.

D.R.C. (Dynamic Resource Control)

Controls how different applications can access files and folders, registry keys, external devices, and network resources.

Scalability and integration


Enterprise Suite’s modular architecture easily scales to meet the needs of growing businesses.

Integration with other security solutions

Enterprise Suite operates alongside and can be integrated with other security and network management tools, such as SIEM, IAM, network traffic security, encryption, and traditional anti-malware solutions.

Products News


There are no articles for this section

All news →