+7 (499) 201-55-12 

 Contacts   Sitemap  
Language:  Russian English     Search: 
Main page  →  Products  →  Products for banks and ATMs  →  TPSecure Teller  →  Overview
Products for Business
Products for banks and ATMs
TPSecure Teller
System Requirements
SoftControl for Windows XP Embedded
PCI DSS Compliance
Renew Your License




Награда "Лучшая производительность" от журнала Hard`n`Soft

100%-я эффективность в борьбе с вредоносным ПО, неопределяемым классическими антивирусными продуктами.

PC Magazine/Russian Edition отмечает Enterprise Suite как одно из лучших приложений обзора "Российское ПО: урожай 2009".

По результатам теста Safe`n`Sec Персональный получил серебряную награду.

Наивысшая оценка экспертов PC Magazine/Russian Edition при лабораторных испытаниях.

"Panda Antivirus Pro 2009 + Safe`n`Sec 2009 Персональный" - наиболее интересная новинка.

Продукты SafenSoft рекомендованы независимым информационно-аналитическим центром

Компания SafenSoft имеет статус Intel Software Partner.

CHIP online: "Safe`n`Sec Personal Pro показал отличный результат детектирования и блокирования новых, а также известных угроз!"

Отличный результат в тесте немецкого онлайн издания PC Welt.


TPSecure Teller

A special version of TPSecure Teller is designed to protect jobs of employees frontoffice bank (tellers, cash). Using TPSecure Teller allows you to build an effective system of protection against external (malicious software, hackers) and internal threats (insiders, disgruntled employees) to ensure the integrity of the system and data protection.


TPSecure Teller is an effective protection for workstations with installed specialized software (client ABS, ASR, etc.). TPSecure controls startup and application activity, that ensuring the integrity of software during operation and maintenance of the system in the last good state. Because of this, the decision is up to date and effective against all types of malware, hacker attacks and against the unwanted actions by safety applications.

The system user-defined rules of application activity, file system access, peripherals and network resources along with a monitoring and logging provide the ability to control and prevent malicious or careless actions of preventing change the settings and configuration of the system and providing data security. The ability to centrally manage and modularity of the system allows to reduce the costs of administration.

Why TPSecure Teller?

Specialized functions for the protection of workstations bank employee
Application launch control

Block attempts by users to launch any unknown application, or only specified applications such as games or multimedia players. Updates are installed automatically

Access to peripheral devices

Granular settings control access to USB drives, CD/DVD devices with the ability to disable auto-configaration and exclusions (by device type, name, manufacturer, ID). In addition, it is possible to block all CD / DVD media except protected and set access rules for COM, LPT ports.

Monitoring and logging

All operations on access and copying of data, including copying on external devices, and data input from the keyboard, are traced and logged with possibility of obtaining notices on certain actions. Presence of the module of monitoring is hidden from the user.

Self-protection system

Nobody, except the authorized administrators, can be connected, stop or remove the client application, even with the rights of the local administrator.

Time-limited rules

When setting application activity policies, access rules can be time-limited to allow for workstation maintenance.


Logging history of changes of certain application allows restoration of files changed by that application.

Maintaining the accounting of the e-mails sent by the employee

It’s possible to track of employee’s transfer of information outside. The name of the attached files is logged when sending email to MS Outlook 2003.

Remote display screen shot session

Remote screen shot session of user’s workstation display in real time as part of a forensic investigation.

Record keyboard input

Record all keyboard input for any application in order to track who, when and what data is entered.

Monitoring of use of external USB stores

Allows to know what files and when were copied by the employee on the USB device or what files and applications were opened from the USB store (operation of reading, record, removal of files).

Monitoring of the files sent to print

Allows to trace and log the facts of sending documents on the press by the employee.

Monitoring of the system register

Allows to trace the changes of the system register which are carried out by the employee or appendices (operations of reading, creation, removal, renaming, change of keys).

Shadow copy for changed files

Automatically saves original copies of changed or deleted files and system registry keys.

Data security from unauthorized access and change software

Control of efficiency of working hours by employees

Cutting edge technologies

Scalability and integration

System requirements »

Print this page


Computer security: Information security solutions | Host Intrusion Prevention System (HIPS) | Endpoint protection | The best virus protection | Whitelisting | Application Integrity Control | Comprehensive Malware Protection | Application protection | Windows Startup / Registry Protection | Online banking security | Online payment protection | Data leakage prevention (DLP) | Information security in medicine
ARUDIT SECURITY, LLC, 2021-2022. All right reserved