Main page  /  TPSecure Teller: forefront protection
    Close   

TPSecure Teller


A special version of TPSecure Teller is designed to protect jobs of employees frontoffice bank (tellers, cash). Using TPSecure Teller allows you to build an effective system of protection against external (malicious software, hackers) and internal threats (insiders, disgruntled employees) to ensure the integrity of the system and data protection.



Overview


TPSecure Teller is an effective protection for workstations with installed specialized software (client ABS, ASR, etc.). TPSecure controls startup and application activity, that ensuring the integrity of software during operation and maintenance of the system in the last good state. Because of this, the decision is up to date and effective against all types of malware, hacker attacks and against the unwanted actions by safety applications.


The system user-defined rules of application activity, file system access, peripherals and network resources along with a monitoring and logging provide the ability to control and prevent malicious or careless actions of preventing change the settings and configuration of the system and providing data security. The ability to centrally manage and modularity of the system allows to reduce the costs of administration.


Why TPSecure Teller?


Specialized functions for the protection of workstations bank employee
Application launch control

Block attempts by users to launch any unknown application, or only specified applications such as games or multimedia players. Updates are installed automatically

Access to peripheral devices

Granular settings control access to USB drives, CD/DVD devices with the ability to disable auto-configaration and exclusions (by device type, name, manufacturer, ID). In addition, it is possible to block all CD / DVD media except protected and set access rules for COM, LPT ports.

Monitoring and logging

All operations on access and copying of data, including copying on external devices, and data input from the keyboard, are traced and logged with possibility of obtaining notices on certain actions. Presence of the module of monitoring is hidden from the user.

Self-protection system

Nobody, except the authorized administrators, can be connected, stop or remove the client application, even with the rights of the local administrator.

Time-limited rules

When setting application activity policies, access rules can be time-limited to allow for workstation maintenance.

Restore

Logging history of changes of certain application allows restoration of files changed by that application.

Maintaining the accounting of the e-mails sent by the employee

It’s possible to track of employee’s transfer of information outside. The name of the attached files is logged when sending email to MS Outlook 2003.

Remote display screen shot session

Remote screen shot session of user’s workstation display in real time as part of a forensic investigation.

Record keyboard input

Record all keyboard input for any application in order to track who, when and what data is entered.

Monitoring of use of external USB stores

Allows to know what files and when were copied by the employee on the USB device or what files and applications were opened from the USB store (operation of reading, record, removal of files).

Monitoring of the files sent to print

Allows to trace and log the facts of sending documents on the press by the employee.

Monitoring of the system register

Allows to trace the changes of the system register which are carried out by the employee or appendices (operations of reading, creation, removal, renaming, change of keys).

Shadow copy for changed files

Automatically saves original copies of changed or deleted files and system registry keys.


Data security from unauthorized access and change software

Control of efficiency of working hours by employees

Cutting edge technologies

Scalability and integration

System requirements »


SafenSoft, 2004-2019. All rights are reserved.