TPSecure Teller is an effective protection for workstations with installed specialized software (client ABS, ASR, etc.). TPSecure controls startup and application activity, that ensuring the integrity of software during operation and maintenance of the system in the last good state. Because of this, the decision is up to date and effective against all types of malware, hacker attacks and against the unwanted actions by safety applications.
The system user-defined rules of application activity, file system access, peripherals and network resources along with a monitoring and logging provide the ability to control and prevent malicious or careless actions of preventing change the settings and configuration of the system and providing data security. The ability to centrally manage and modularity of the system allows to reduce the costs of administration.
Block attempts by users to launch any unknown application, or only specified applications such as games or multimedia players. Updates are installed automatically.
Granular settings control access to USB drives, CD/DVD devices with the ability to disable auto-configaration and exclusions (by device type, name, manufacturer, ID). In addition, it is possible to block all CD / DVD media except protected and set access rules for COM, LPT ports.
All operations on access and copying of data, including copying on external devices, and data input from the keyboard, are traced and logged with possibility of obtaining notices on certain actions. Presence of the module of monitoring is hidden from the user.
Nobody, except the authorized administrators, can be connected, stop or remove the client application, even with the rights of the local administrator.
When setting application activity policies, access rules can be time-limited to allow for workstation maintenance.
Logging history of changes of certain application allows restoration of files changed by that application.
It’s possible to track of employee’s transfer of information outside. The name of the attached files is logged when sending email to MS Outlook 2003.
Remote screen shot session of user’s workstation display in real time as part of a forensic investigation.
Record all keyboard input for any application in order to track who, when and what data is entered.
Allows to know what files and when were copied by the employee on the USB device or what files and applications were opened from the USB store (operation of reading, record, removal of files).
Allows to trace and log the facts of sending documents on the press by the employee.
Allows to trace the changes of the system register which are carried out by the employee or appendices (operations of reading, creation, removal, renaming, change of keys).
Automatically saves original copies of changed or deleted files and system registry keys.
Protects all executable software on the system by detecting any unauthorized activation attempt and preventing the process from launching before damage can occur.
Specially-designated user account for potentially vulnerable software provides system-level privilege controls to block dangerous software activity
Controls how different applications can access files and folders, registry keys, external devices, and network resources. User-driven rules can be created to control application activity.
Enables custom protection to be implemented for specific software in the following ways:
Necessary information for the personnel department of the company and also for heads. Allows to reduce expenses, effectively using a manpower of the company and controlling discipline of employees.
Keep track of who uses which applications as well as the time spent using those applications.
SysWatch is built around SoftControl’s unique, patent-pending V.I.P.O. (Valid Inside Permitted Operations) technology, which combines three levels of protection:
Protects all executable software on the system by detecting any unauthorized activation attempt and preventing the process from launching before damage can occur. Preserves the system in a known-good state.
Specially-designated user account for potentially dangerous software provides system-level privilege controls to block malicious software activity. Also protects the PC from software vulnerabilities.
Controls how different applications can access files and folders, registry keys, external devices, and network resources.
Enterprise Suite’s modular architecture easily scales to meet the needs of growing businesses.
Enterprise Suite operates alongside and can be integrated with other security and network management tools, such as SIEM, IAM, network traffic security, encryption, and traditional anti-malware solutions.