|
Additional information is available with the trial version for freeLive and recorded demonstrations of SoftControl technology advantages will become available on filling the request form. A detailed version of TPSecure Teller Administrator Guide is included into trial version package and provides the insight on the level of customization you can achieve with no additional charge. Our technical English-speaking support team is available 24/7 if you require answers on specific questions regarding the product. The information you enter into request form will not be disclosed in any way and is only for internal use. To get in contact with our specialists, fill the form and press the "Send request" button.
|
TPSecure Teller is an effective protection for workstations with installed specialized software (client ABS, ASR, etc.). TPSecure controls startup and application activity, that ensuring the integrity of software during operation and maintenance of the system in the last good state. Because of this, the decision is up to date and effective against all types of malware, hacker attacks and against the unwanted actions by safety applications.
The system user-defined rules of application activity, file system access, peripherals and network resources along with a monitoring and logging provide the ability to control and prevent malicious or careless actions of preventing change the settings and configuration of the system and providing data security. The ability to centrally manage and modularity of the system allows to reduce the costs of administration.
Specialized functions for the protection of workstations bank employee |
Application launch control | Block attempts by users to launch any unknown application, or only specified applications such as games or multimedia players. Updates are installed automatically |
Access to peripheral devices | Granular settings control access to USB drives, CD/DVD devices with the ability to disable auto-configaration and exclusions (by device type, name, manufacturer, ID). In addition, it is possible to block all CD / DVD media except protected and set access rules for COM, LPT ports. |
Monitoring and logging | All operations on access and copying of data, including copying on external devices, and data input from the keyboard, are traced and logged with possibility of obtaining notices on certain actions. Presence of the module of monitoring is hidden from the user. |
Self-protection system | Nobody, except the authorized administrators, can be connected, stop or remove the client application, even with the rights of the local administrator. |
Time-limited rules | When setting application activity policies, access rules can be time-limited to allow for workstation maintenance. |
Restore | Logging history of changes of certain application allows restoration of files changed by that application. |
Maintaining the accounting of the e-mails sent by the employee | It’s possible to track of employee’s transfer of information outside. The name of the attached files is logged when sending email to MS Outlook 2003. |
Remote display screen shot session | Remote screen shot session of user’s workstation display in real time as part of a forensic investigation. |
Record keyboard input | Record all keyboard input for any application in order to track who, when and what data is entered. |
Monitoring of use of external USB stores | Allows to know what files and when were copied by the employee on the USB device or what files and applications were opened from the USB store (operation of reading, record, removal of files). |
Monitoring of the files sent to print | Allows to trace and log the facts of sending documents on the press by the employee. |
Monitoring of the system register | Allows to trace the changes of the system register which are carried out by the employee or appendices (operations of reading, creation, removal, renaming, change of keys). |
Shadow copy for changed files | Automatically saves original copies of changed or deleted files and system registry keys. |
Data security from unauthorized access and change software |
Control of efficiency of working hours by employees |
Cutting edge technologies |
Scalability and integration |