SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
Safetica Endpoint Security Datasheet
Employees pose a threat to your company – often unintentionally, yet sometimes they know very
well what they’re doing. They’re pretending to be working while they’re slacking off, waste
company resources, accidentally lose sensitive data or deliberately steal confident informa-
tion to sell it off to competition. Safetica Endpoint Security is the world’s only software able
to protect your company from all major problems caused by insiders: sensitive data leaks,
financial losses and damaged reputation. At the same time, Safetica Endpoint Security
reveals any suspicious behavior long before any harm is sustained.

•	   Protect your company against the consequences of personnel error.
•	   Detect your employees’ behavior damaging your company in good time.
•	   Obtain an overview on the working activity and productivity of your staff.
•	   Ensure that sensitive company data stays where it should - inside the company.
•	   Protect your company‘s interests with regard to your employees’ privacy.
•	   Ensure that staff access sensitive information only in the approved way.
•	   Obtain security software that does not disrupt your current company processes.
•	   Reach compliance with industrial standards, regulations and laws easily.


Monitoring and Evaluate
Safetica Endpoint Security automatically reveals any po-                                               Endpoint Auditor
tentially harmful behavior of your personnel. It analyzes
their activities and warns the management of any imminent
danger. Safetica measures and records staff productivity,
detects changes in their behavior and thus allows you to
assess the level of risk they present. Significant changes in
employee behavior are often brought about by loss of mo-
tivation or a better offer from the competition. If you have           productivity

doubts about your employees’ loyalty or motivation, you
can simply browse through logs of every single operation
they made: which applications they launched, websites they                                             new job
visited, who they wrote to and what files they worked with.

Intelligent employee profiling
Understand who your employees are and what intentions
they have. Are they considering leaving your company?
Are they looking for a new job? Or have they simply lost
their motivation? Do they spend a lot of time on tasks un-
related to their job? By means of well-ordered outputs and
immediate alerts, you will receive a quick summary of pos-
sible personal and security threats in advance.

•	 Productivity Monitoring
•	 Employee Profiling
•	 Alerts
                                                                summary of who visits what pages, when and for how long,
                                                                how many e-mails they send and how much time they spend
Internet usage monitoring                                       chatting.
During their working hours, your employees often deal with
their personal correspondence and visit social networks and
                                                                •	   Websites Access Monitoring
other websites which lower their productivity. You end up
                                                                •	   Website Categorization
paying them for work they did not perform. Reveal which
                                                                •	   E-mail monitoring
webpages distract your staff the most and how much time
                                                                •	   Webmail monitoring
they spend there. Internet Usage Monitoring provides a
                                                                •	   Versatile IM monitoring
Activity monitoring
Are you sure you know exactly what your employees are
doing on a computer during their working hours? Have you
                                                                       Endpoint Supervisor            CEO     Assistant   Accountant
ever wondered if they are really pursuing what they are
supposed to? By monitoring employee activity you will get                   Internet
a summary of how they spend their time at work. You will
                                                                            facebook.com
be able to identify those who are not really trying to do their             youtube.com
best. What’s more, you will be informed of any activities                   times.com
which could endanger your enterprise or jeopardize your
company data in time.                                                       Applications
                                                                            Freecell
•	   Intelligent Screen Recording                                           MS Word
•	   KeyLogger
•	   Search Monitoring                                                      Printing
•	   File monitoring                                                        Office
                                                                            Hall
Printer monitoring
Do your employees have a free hand at printing? Have
you ever wondered how many sensitive documents might
be printed during one workday? Has it ever occurred to
you that some of your employees can easily use company
printers for their personal use? Gain an insight into how
your company printers are used and who of your personnel
consumes most of printing resources. Uncover leaks of sensi-
tive documents and save operating costs.

Control and EnforceSafetica Endpoint Security restricts em-
ployee privileges so that they are allowed to perform only
the tasks related to their job. It assesses their activity, blocks
undesirable operations and informs the management about
incurred problems. So, with Safetica you will be able to pro-        With Safetica you can block any undesirable webpages.
actively reduce labor costs, save company resources and              Therefore, your personnel will not be tempted to while away
eliminate problems resulting from your employees behaving            their working hours by playing online games or visiting so-
irresponsibly.                                                       cial networks.

Control and Enforce                                                  •	 Website Blocking based on Categories and Keywords
Safetica Endpoint Security restricts employee privileges so          •	 Detailed Website Categorization
that they are allowed to perform only the tasks related to           •	 Blocking of HTTPS connection
their job. It assesses their activity, blocks undesirable opera-
tions and informs the management about incurred problems.            Print control
So, with Safetica you will be able to proactively reduce la-         Disable printing of personal files and prevent unauthorized
bor costs, save company resources and eliminate problems             printing of sensitive documents. Are your employees con-
resulting from your employees behaving irresponsibly.                vinced that they are free to print anything, even if it’s only
                                                                     for their personal use? Get your company printers under
Application control                                                  control. By seeing who prints what, you can reduce print-
By installing illegal and often dangerous applications your          ing costs and prevent unauthorized printing of confidential
employees pose a threat to your company’s security. Get rid          documents.
of pirate programs, malware, games and other undesirable
applications that are not suitable for a company environ-            •	 Printer Access Blocking
ment. Prevent your staff from endangering your company               •	 Block printing of selected documents
and pick only those applications which are appropriate for
their tasks.                                                         Data Loss PreventionSafetica Endpoint Security is the ulti-
                                                                     mate shield protecting your confident information. It keeps
•	 Application Blocking                                              your data safe not only from unauthorized access, but also
•	 Extensive Application Database                                    from people who have the privileges to access it and work
                                                                     with it. For, although your employees may have the rights
Web control                                                          to use the data, their intentions may not always be as pure
Would you be surprised, if you found out your employees              as the driven snow. Safetica Endpoint DLP is here to protect
spend a large part of their working hours visiting websites          you. It helps you to prevent financial losses and damage to
not related to their work? Cut off unproductive activities.          your company reputation.
Data Leak Prevention                                                                                                                 Endpoint DLP
Safetica Endpoint Security is the ultimate shield protecting
your confident information. It keeps your data safe not only
from unauthorized access, but also from people who have
the privileges to access it and work with it. For, although                                        Creation
your employees may have the rights to use the data, their                                      New data immediately
                                                                                                    secured.
intentions may not always be as pure as the driven snow.
Safetica Endpoint DLP is here to protect you. It helps you                       Deleting                        Transport
to prevent financial losses and damage to your company                           Erase redundant
                                                                                  data reliably.
                                                                                                                  Keep information
                                                                                                                   safe on the go.
reputation.

                                                                                       Storage                Usage
Device control                                                                        All data encrypted   Prevent illegitimate
Stop sensitive information leaking from your company. Pre-                                 securely.          data usage.

vent your staff from taking your confidential information and
storing them on unknown flash drives, mobile phones or any
other devices. You will not only avoid sensitive data leaks,
but you will also prevent attacks of viruses and other dan-
gerous applications. Devices often carry malicious software
and usually, their owners are not even aware of this infec-
tion. Restrict the use of unknown devices and select only
those devices which are essential for your employees to do
their work. Every attempt to connect an unauthorized device
is blocked, logged and reported.

•	 Access Control
•	 Identification and Blocking of Specific USB and Blue-
   tooth Devices


Data at rest protection
Protect your company from leaks of data stored on worksta-
tions or servers. You decide who has access to company            job. Prevent third party applications from spying on your
files and what they can do with them. Safetica also enables       confidential information as it is being processed on client
you to safely delete the data which is no longer needed so        stations.
that it cannot be recovered.
                                                                  •	   DLP Rules
•	 Disk Encryption                                                •	   Anti-KeyLogger
•	 Data Shredder                                                  •	   Intelligent Data Classification
                                                                  •	   Application Data Access Control
Data in motion protection
How many of your employees take your sensitive informa-           And much more…
tion away on portable devices? And how many of them
have already lost such a portable disk or had a laptop sto-       Time efficient security
len? Protect your sensitive company information even if it is     Forget all the slow and difficult processes of integrating se-
miles away from you. With Safetica Endpoint Security, your        curity software into company infrastructure. Safetica End-
data is safe all the time and no third party can access it.       point Security is designed specifically not to hinder you or
Make sure that no one will ever find a flash drive with your      your staff at work. Your security manager will save time he/
company’s confidential data lying around on a street.             she would otherwise have to spend on setting security poli-
                                                                  cies. Our software does not limit your employees in their
•	 Portable Disk Encryption                                       usual work at all. Your network administrators will almost
•	 The Safest Encryption Algorithms                               immediately be able to set the security software so that it
                                                                  complies with local laws and relevant industrial standards.
Data in use protection
Your sensitive information is most vulnerable while your em-      •	   Easy-to-use Setting Templates
ployees are working with it. If they have legitimate access       •	   Task Scheduler
to your data, there is nothing to stop them from copying it       •	   Remote Client Administration
onto a flash drive or forwarding it via an e-mail. Do not         •	   Automatic Alerts
allow your personnel to misuse their access rights. Prevent       •	   Detailed Access Control to Administration and Supervi-
them from making unauthorized operations with your data                sion
and check if they really use it only for tasks related to their   •	 Optimization for Large Networks Installation
Regulatory compliance                                                      •	 Easy adoption of industrial stan-                              License Policy
                                                                              dards and regulatory compliance                                Safetica Endpoint Security is licensed by the
Safetica Endpoint Security will help you
                                                                           •	 Activation of individual product                               subscription model (per year). The license
to meet legislative requirements and in-                                                                                                     influences the number of stations which can
dustrial standards. The software can be                                       components in order to meet the rel-
                                                                                                                                             use the Safetica software at the same time.
easily adapted to specific regulations,                                       evant standards                                                Each client operating system using the Sa­
directives and laws. It enables you to                                     •	 Preset templates for particular stan-                          fetica software needs license (licensed per
protect your company interests and at                                         dards and laws                                                 asset). For extension of a previously purcha-
                                                                           •	 Recommendations for easy achieve-                              sed license in its validity period there is an
the same time, stay in compliance with
                                                                              ment of conformity with standards                              extending license.
local legislation governing employee
privacy rights.                                                            •	 Import and export of templates for
                                                                              quick setting                                                  Technical requirements

                                                                                                                                             Safetica Endpoint Client

                                                                                                                                             Recommended requirements:
                                                                                    t                                                        •	 1,6 GHz dual-core processor 32-bit
                                                              Manager           Aler age
                                                                                 M ess                                                           (x86) or 64-bit (x64)
                                                                                                                    Local managers
                                                                                                                    with Safetica            •	 1 GB of RAM memory
                                                                                                                    Management console       •	 2 GB of free disk space
                                                                                                                                             •	 Installation on client
                                                                                                                                             •	 Hidden agent (also with GUI)
                                                                                                                                             •	 MS Windows XP SP2, Vista, 7,
          Safetica                                          Safetica                                                                             32-bit and 64-bit
    Management                                            Management
 Service connected                                          Console
                                                                                                                                             •	 MSI installation package
   to SQL database
                                                                                                                                             Safetica Management Service

                                                                                                                                             Recommended requirements:
                                                                                                    Normal operation                         •	 2,4 GHz dual-core processor 32-bit
                                                                                                    Log monitoring and management                (x86) or 64-bit (x64)
      Safetica Endpoint Client                     Laptop                                           Transfers data after the connection      •	 2 GB of RAM memory
       on every workstation                    out of network                                                                                •	 10 GB of free disk space
                                                                                                                                             •	 Shared or dedicated server, more
                                                                                                                                                 servers better load balancing availa­
Safetica Endpoint Security is software based on client-server architecture. This archi-                                                          bility
tecture consists of a client (Safetica Endpoint Client), a server part (Safetica Endpoint                                                    •	 MS Windows Server 2003, 2003 R2,
Service), a database (MS SQL with a large installation, SQLite with a small installa-                                                            2008, 2008 R2, 32-bit and 64-bit
                                                                                                                                             •	 MS SQL or SQLite for smaller networks
tion) and an administrator console (Safetica Management Console).
                                                                                                                                             •	 Support for Active Directory or wit­ out
                                                                                                                                                                                   h
                                                                                                                                                 AD also
Within one domain more services can run due to load distribution by means of an
Active Directory tree division. An alternative for a smaller network is also the opti­
on of installation to a network without a domain where this service can run on an
ordinary PC.

The database is used for storing of monitoring settings and results. It also includes
categoriza­ion database with application categories and web pages.
          t




                                                   Intelligent Employee
                                                                               Print Control
                                                           Profiling
                                       Activity
                                      Monitoring                                                      Application
                     Internet Usage                                                                    Control
                        Monitoring                    Endpoint                  Endpoint
                                                       Auditor                 Supervisor
                                                                                                                           Web Control
                                                                   Endpoint
         Printer
                                                                     DLP
        Monitoring



                     Regulatory                                                                                     Data in Use
                     Compliance                                                                                      Protection
                                       Data at Rest                                            Data in Motion
                                        Protection          Endpoint                             Protection
                                                          Security Tools   Device Control                                                    Try Safetica today and get 30
                                                                                                                                             days of protection for free

                                                                                                                                             Visit our website

© Copyright 2012 Safetica Technologies s.r.o. All rights reserved. Safetica is a registered trademark of Safetica Technologies s.r.o. All
trademarks are the property of their respective owners. Contact your reseller for Safetica Endpoint Security. Safetica Technologies s.r.o.
reserves the right to change product specifications or other product information without notice.	                                                   www.safetica.com
Prague | Czech Republic | Europe | 1st of February 2012

Más contenido relacionado

La actualidad más candente

Physician Office Presentation
Physician Office PresentationPhysician Office Presentation
Physician Office Presentationfranbodh
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application SecurityNicholas Davis
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarIBM Security
 
Ten top tips on keeping your business secure
Ten top tips on keeping your business secureTen top tips on keeping your business secure
Ten top tips on keeping your business secureBurCom Consulting Ltd.
 
10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program 10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program Dtex Systems
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 
APAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecurityAPAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecuritySolarWinds
 

La actualidad más candente (8)

Advanced persistent threats
Advanced persistent threatsAdvanced persistent threats
Advanced persistent threats
 
Physician Office Presentation
Physician Office PresentationPhysician Office Presentation
Physician Office Presentation
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
Ten top tips on keeping your business secure
Ten top tips on keeping your business secureTen top tips on keeping your business secure
Ten top tips on keeping your business secure
 
10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program 10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
APAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecurityAPAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds Security
 

Similar a Safetica Endpoint Security Datasheet by Safetica Benelux - EN

SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析Cheer Chain Enterprise Co., Ltd.
 
Are Your Endpoints Protected?
Are Your Endpoints Protected?Are Your Endpoints Protected?
Are Your Endpoints Protected?The TNS Group
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologyDavid J Rosenthal
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
6 ways to manage IT Security
6 ways to manage IT Security6 ways to manage IT Security
6 ways to manage IT SecurityMonami Saluja
 
Caloosa Tech Times October 2009
Caloosa Tech Times October 2009Caloosa Tech Times October 2009
Caloosa Tech Times October 2009ITbyTheSea
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
The 15 best cloud security practices
The 15 best cloud security practices The 15 best cloud security practices
The 15 best cloud security practices Cloudride LTD
 
Protect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak preventionProtect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak preventionAdi Saputra
 
Threat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the CloudThreat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the CloudBen Johnson
 
Microsoft Teams in the Modern Workplace
Microsoft Teams in the Modern WorkplaceMicrosoft Teams in the Modern Workplace
Microsoft Teams in the Modern WorkplaceJoanne Klein
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint securityhassan latifi
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfTechSoup
 
Power Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPower Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPowerSaturdayParis
 
Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work togetherWendy Knox Everette
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudNordic Backup
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreWilliam Mann
 

Similar a Safetica Endpoint Security Datasheet by Safetica Benelux - EN (20)

SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
 
Are Your Endpoints Protected?
Are Your Endpoints Protected?Are Your Endpoints Protected?
Are Your Endpoints Protected?
 
Intranet Design: Step by Step Design Guide
Intranet Design: Step by Step Design GuideIntranet Design: Step by Step Design Guide
Intranet Design: Step by Step Design Guide
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor Technology
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
6 ways to manage IT Security
6 ways to manage IT Security6 ways to manage IT Security
6 ways to manage IT Security
 
Caloosa Tech Times October 2009
Caloosa Tech Times October 2009Caloosa Tech Times October 2009
Caloosa Tech Times October 2009
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
The 15 best cloud security practices
The 15 best cloud security practices The 15 best cloud security practices
The 15 best cloud security practices
 
Protect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak preventionProtect data effectively with endpoint encryption & data leak prevention
Protect data effectively with endpoint encryption & data leak prevention
 
Threat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the CloudThreat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the Cloud
 
Microsoft Teams in the Modern Workplace
Microsoft Teams in the Modern WorkplaceMicrosoft Teams in the Modern Workplace
Microsoft Teams in the Modern Workplace
 
eTrax Employees Monitoring System
eTrax Employees Monitoring SystemeTrax Employees Monitoring System
eTrax Employees Monitoring System
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint security
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
 
Power Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPower Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 security
 
Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work together
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 

Último

Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 

Último (20)

Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 

Safetica Endpoint Security Datasheet by Safetica Benelux - EN

  • 1. Safetica Endpoint Security Datasheet Employees pose a threat to your company – often unintentionally, yet sometimes they know very well what they’re doing. They’re pretending to be working while they’re slacking off, waste company resources, accidentally lose sensitive data or deliberately steal confident informa- tion to sell it off to competition. Safetica Endpoint Security is the world’s only software able to protect your company from all major problems caused by insiders: sensitive data leaks, financial losses and damaged reputation. At the same time, Safetica Endpoint Security reveals any suspicious behavior long before any harm is sustained. • Protect your company against the consequences of personnel error. • Detect your employees’ behavior damaging your company in good time. • Obtain an overview on the working activity and productivity of your staff. • Ensure that sensitive company data stays where it should - inside the company. • Protect your company‘s interests with regard to your employees’ privacy. • Ensure that staff access sensitive information only in the approved way. • Obtain security software that does not disrupt your current company processes. • Reach compliance with industrial standards, regulations and laws easily. Monitoring and Evaluate Safetica Endpoint Security automatically reveals any po- Endpoint Auditor tentially harmful behavior of your personnel. It analyzes their activities and warns the management of any imminent danger. Safetica measures and records staff productivity, detects changes in their behavior and thus allows you to assess the level of risk they present. Significant changes in employee behavior are often brought about by loss of mo- tivation or a better offer from the competition. If you have productivity doubts about your employees’ loyalty or motivation, you can simply browse through logs of every single operation they made: which applications they launched, websites they new job visited, who they wrote to and what files they worked with. Intelligent employee profiling Understand who your employees are and what intentions they have. Are they considering leaving your company? Are they looking for a new job? Or have they simply lost their motivation? Do they spend a lot of time on tasks un- related to their job? By means of well-ordered outputs and immediate alerts, you will receive a quick summary of pos- sible personal and security threats in advance. • Productivity Monitoring • Employee Profiling • Alerts summary of who visits what pages, when and for how long, how many e-mails they send and how much time they spend Internet usage monitoring chatting. During their working hours, your employees often deal with their personal correspondence and visit social networks and • Websites Access Monitoring other websites which lower their productivity. You end up • Website Categorization paying them for work they did not perform. Reveal which • E-mail monitoring webpages distract your staff the most and how much time • Webmail monitoring they spend there. Internet Usage Monitoring provides a • Versatile IM monitoring
  • 2. Activity monitoring Are you sure you know exactly what your employees are doing on a computer during their working hours? Have you Endpoint Supervisor CEO Assistant Accountant ever wondered if they are really pursuing what they are supposed to? By monitoring employee activity you will get Internet a summary of how they spend their time at work. You will facebook.com be able to identify those who are not really trying to do their youtube.com best. What’s more, you will be informed of any activities times.com which could endanger your enterprise or jeopardize your company data in time. Applications Freecell • Intelligent Screen Recording MS Word • KeyLogger • Search Monitoring Printing • File monitoring Office Hall Printer monitoring Do your employees have a free hand at printing? Have you ever wondered how many sensitive documents might be printed during one workday? Has it ever occurred to you that some of your employees can easily use company printers for their personal use? Gain an insight into how your company printers are used and who of your personnel consumes most of printing resources. Uncover leaks of sensi- tive documents and save operating costs. Control and EnforceSafetica Endpoint Security restricts em- ployee privileges so that they are allowed to perform only the tasks related to their job. It assesses their activity, blocks undesirable operations and informs the management about incurred problems. So, with Safetica you will be able to pro- With Safetica you can block any undesirable webpages. actively reduce labor costs, save company resources and Therefore, your personnel will not be tempted to while away eliminate problems resulting from your employees behaving their working hours by playing online games or visiting so- irresponsibly. cial networks. Control and Enforce • Website Blocking based on Categories and Keywords Safetica Endpoint Security restricts employee privileges so • Detailed Website Categorization that they are allowed to perform only the tasks related to • Blocking of HTTPS connection their job. It assesses their activity, blocks undesirable opera- tions and informs the management about incurred problems. Print control So, with Safetica you will be able to proactively reduce la- Disable printing of personal files and prevent unauthorized bor costs, save company resources and eliminate problems printing of sensitive documents. Are your employees con- resulting from your employees behaving irresponsibly. vinced that they are free to print anything, even if it’s only for their personal use? Get your company printers under Application control control. By seeing who prints what, you can reduce print- By installing illegal and often dangerous applications your ing costs and prevent unauthorized printing of confidential employees pose a threat to your company’s security. Get rid documents. of pirate programs, malware, games and other undesirable applications that are not suitable for a company environ- • Printer Access Blocking ment. Prevent your staff from endangering your company • Block printing of selected documents and pick only those applications which are appropriate for their tasks. Data Loss PreventionSafetica Endpoint Security is the ulti- mate shield protecting your confident information. It keeps • Application Blocking your data safe not only from unauthorized access, but also • Extensive Application Database from people who have the privileges to access it and work with it. For, although your employees may have the rights Web control to use the data, their intentions may not always be as pure Would you be surprised, if you found out your employees as the driven snow. Safetica Endpoint DLP is here to protect spend a large part of their working hours visiting websites you. It helps you to prevent financial losses and damage to not related to their work? Cut off unproductive activities. your company reputation.
  • 3. Data Leak Prevention Endpoint DLP Safetica Endpoint Security is the ultimate shield protecting your confident information. It keeps your data safe not only from unauthorized access, but also from people who have the privileges to access it and work with it. For, although Creation your employees may have the rights to use the data, their New data immediately secured. intentions may not always be as pure as the driven snow. Safetica Endpoint DLP is here to protect you. It helps you Deleting Transport to prevent financial losses and damage to your company Erase redundant data reliably. Keep information safe on the go. reputation. Storage Usage Device control All data encrypted Prevent illegitimate Stop sensitive information leaking from your company. Pre- securely. data usage. vent your staff from taking your confidential information and storing them on unknown flash drives, mobile phones or any other devices. You will not only avoid sensitive data leaks, but you will also prevent attacks of viruses and other dan- gerous applications. Devices often carry malicious software and usually, their owners are not even aware of this infec- tion. Restrict the use of unknown devices and select only those devices which are essential for your employees to do their work. Every attempt to connect an unauthorized device is blocked, logged and reported. • Access Control • Identification and Blocking of Specific USB and Blue- tooth Devices Data at rest protection Protect your company from leaks of data stored on worksta- tions or servers. You decide who has access to company job. Prevent third party applications from spying on your files and what they can do with them. Safetica also enables confidential information as it is being processed on client you to safely delete the data which is no longer needed so stations. that it cannot be recovered. • DLP Rules • Disk Encryption • Anti-KeyLogger • Data Shredder • Intelligent Data Classification • Application Data Access Control Data in motion protection How many of your employees take your sensitive informa- And much more… tion away on portable devices? And how many of them have already lost such a portable disk or had a laptop sto- Time efficient security len? Protect your sensitive company information even if it is Forget all the slow and difficult processes of integrating se- miles away from you. With Safetica Endpoint Security, your curity software into company infrastructure. Safetica End- data is safe all the time and no third party can access it. point Security is designed specifically not to hinder you or Make sure that no one will ever find a flash drive with your your staff at work. Your security manager will save time he/ company’s confidential data lying around on a street. she would otherwise have to spend on setting security poli- cies. Our software does not limit your employees in their • Portable Disk Encryption usual work at all. Your network administrators will almost • The Safest Encryption Algorithms immediately be able to set the security software so that it complies with local laws and relevant industrial standards. Data in use protection Your sensitive information is most vulnerable while your em- • Easy-to-use Setting Templates ployees are working with it. If they have legitimate access • Task Scheduler to your data, there is nothing to stop them from copying it • Remote Client Administration onto a flash drive or forwarding it via an e-mail. Do not • Automatic Alerts allow your personnel to misuse their access rights. Prevent • Detailed Access Control to Administration and Supervi- them from making unauthorized operations with your data sion and check if they really use it only for tasks related to their • Optimization for Large Networks Installation
  • 4. Regulatory compliance • Easy adoption of industrial stan- License Policy dards and regulatory compliance Safetica Endpoint Security is licensed by the Safetica Endpoint Security will help you • Activation of individual product subscription model (per year). The license to meet legislative requirements and in- influences the number of stations which can dustrial standards. The software can be components in order to meet the rel- use the Safetica software at the same time. easily adapted to specific regulations, evant standards Each client operating system using the Sa­ directives and laws. It enables you to • Preset templates for particular stan- fetica software needs license (licensed per protect your company interests and at dards and laws asset). For extension of a previously purcha- • Recommendations for easy achieve- sed license in its validity period there is an the same time, stay in compliance with ment of conformity with standards extending license. local legislation governing employee privacy rights. • Import and export of templates for quick setting Technical requirements Safetica Endpoint Client Recommended requirements: t • 1,6 GHz dual-core processor 32-bit Manager Aler age M ess (x86) or 64-bit (x64) Local managers with Safetica • 1 GB of RAM memory Management console • 2 GB of free disk space • Installation on client • Hidden agent (also with GUI) • MS Windows XP SP2, Vista, 7, Safetica Safetica 32-bit and 64-bit Management Management Service connected Console • MSI installation package to SQL database Safetica Management Service Recommended requirements: Normal operation • 2,4 GHz dual-core processor 32-bit Log monitoring and management (x86) or 64-bit (x64) Safetica Endpoint Client Laptop Transfers data after the connection • 2 GB of RAM memory on every workstation out of network • 10 GB of free disk space • Shared or dedicated server, more servers better load balancing availa­ Safetica Endpoint Security is software based on client-server architecture. This archi- bility tecture consists of a client (Safetica Endpoint Client), a server part (Safetica Endpoint • MS Windows Server 2003, 2003 R2, Service), a database (MS SQL with a large installation, SQLite with a small installa- 2008, 2008 R2, 32-bit and 64-bit • MS SQL or SQLite for smaller networks tion) and an administrator console (Safetica Management Console). • Support for Active Directory or wit­ out h AD also Within one domain more services can run due to load distribution by means of an Active Directory tree division. An alternative for a smaller network is also the opti­ on of installation to a network without a domain where this service can run on an ordinary PC. The database is used for storing of monitoring settings and results. It also includes categoriza­ion database with application categories and web pages. t Intelligent Employee Print Control Profiling Activity Monitoring Application Internet Usage Control Monitoring Endpoint Endpoint Auditor Supervisor Web Control Endpoint Printer DLP Monitoring Regulatory Data in Use Compliance Protection Data at Rest Data in Motion Protection Endpoint Protection Security Tools Device Control Try Safetica today and get 30 days of protection for free Visit our website © Copyright 2012 Safetica Technologies s.r.o. All rights reserved. Safetica is a registered trademark of Safetica Technologies s.r.o. All trademarks are the property of their respective owners. Contact your reseller for Safetica Endpoint Security. Safetica Technologies s.r.o. reserves the right to change product specifications or other product information without notice. www.safetica.com Prague | Czech Republic | Europe | 1st of February 2012