Web filtering
The Next Generation of Web Filtering
By solving the web filtering problem directly at the endpoint, we can remove the need for hardware, eliminates latency, and extends protection beyond the corporate network. In addition web filtering is designed to extend your visibility beyond a simple list of URLs and give you a true understanding of whether or not your employees are acting in a safe productive manner.
Main Advantages of Web Filtering
- It Works Both On and Off of the Corporate Network
- It Delivers Unparalleled Visibility
- The Only Saas – Capable Solution of its Kind
Employee Monitoring
- Monitor all communications (email, instant messages, webmail)
- Take screenshots of any desired computer activity
- Record all keystrokes if desired
- Cutting edge web-filtering (control web-surfing and block access to inappropriate websites)
- Block access to time-wasting software programs (games, video players, etc.)
- Set time schedules for when applications can be used.
Data Loss Prevention
Email Leak Prevention:
- Automatic policy enforcement based on scan of outgoing content
- Prevent leakage via email bodies and email attachments
- Be alerted to all policy violations
Endpoint USB Leak Prevention:
- Automatic policy enforcement based on scan of outgoing content
- Prevent leakage via USB devices
- Be alerted to all policy violations
Scan Data At Rest to determine where confidential data resides:
- Automatically scans all new files on all PCs in your organization
- Shows you where policy-violating documents exist
- Allows you to remotely delete those documents if desired to bring you into compliance and eliminate risks
Laptop Recovery
- Geo-locate laptops in real time no matter where an employee or thief goes (plotted on a map)
- Geo-location is determined by wi-fi signal, not IP address, which is highly inaccurate
- Remotely delete files from the stolen laptop (to a US Dept. of Defense standard that ensures complete destruction of the files
- Get confirmation of deletion of files
- Remotely retrieve files from the stolen laptop
- Monitor and control everything the thief does
- Lock down the stolen laptop if desired
- Our recovery team works with law enforcement to recover the physical asset
- Our Geo-location is more accurate than GPS