Safetica Endpoint Security Datasheet by Safetica Benelux - EN
1. Safetica Endpoint Security Datasheet
Employees pose a threat to your company – often unintentionally, yet sometimes they know very
well what they’re doing. They’re pretending to be working while they’re slacking off, waste
company resources, accidentally lose sensitive data or deliberately steal confident informa-
tion to sell it off to competition. Safetica Endpoint Security is the world’s only software able
to protect your company from all major problems caused by insiders: sensitive data leaks,
financial losses and damaged reputation. At the same time, Safetica Endpoint Security
reveals any suspicious behavior long before any harm is sustained.
• Protect your company against the consequences of personnel error.
• Detect your employees’ behavior damaging your company in good time.
• Obtain an overview on the working activity and productivity of your staff.
• Ensure that sensitive company data stays where it should - inside the company.
• Protect your company‘s interests with regard to your employees’ privacy.
• Ensure that staff access sensitive information only in the approved way.
• Obtain security software that does not disrupt your current company processes.
• Reach compliance with industrial standards, regulations and laws easily.
Monitoring and Evaluate
Safetica Endpoint Security automatically reveals any po- Endpoint Auditor
tentially harmful behavior of your personnel. It analyzes
their activities and warns the management of any imminent
danger. Safetica measures and records staff productivity,
detects changes in their behavior and thus allows you to
assess the level of risk they present. Significant changes in
employee behavior are often brought about by loss of mo-
tivation or a better offer from the competition. If you have productivity
doubts about your employees’ loyalty or motivation, you
can simply browse through logs of every single operation
they made: which applications they launched, websites they new job
visited, who they wrote to and what files they worked with.
Intelligent employee profiling
Understand who your employees are and what intentions
they have. Are they considering leaving your company?
Are they looking for a new job? Or have they simply lost
their motivation? Do they spend a lot of time on tasks un-
related to their job? By means of well-ordered outputs and
immediate alerts, you will receive a quick summary of pos-
sible personal and security threats in advance.
• Productivity Monitoring
• Employee Profiling
• Alerts
summary of who visits what pages, when and for how long,
how many e-mails they send and how much time they spend
Internet usage monitoring chatting.
During their working hours, your employees often deal with
their personal correspondence and visit social networks and
• Websites Access Monitoring
other websites which lower their productivity. You end up
• Website Categorization
paying them for work they did not perform. Reveal which
• E-mail monitoring
webpages distract your staff the most and how much time
• Webmail monitoring
they spend there. Internet Usage Monitoring provides a
• Versatile IM monitoring
2. Activity monitoring
Are you sure you know exactly what your employees are
doing on a computer during their working hours? Have you
Endpoint Supervisor CEO Assistant Accountant
ever wondered if they are really pursuing what they are
supposed to? By monitoring employee activity you will get Internet
a summary of how they spend their time at work. You will
facebook.com
be able to identify those who are not really trying to do their youtube.com
best. What’s more, you will be informed of any activities times.com
which could endanger your enterprise or jeopardize your
company data in time. Applications
Freecell
• Intelligent Screen Recording MS Word
• KeyLogger
• Search Monitoring Printing
• File monitoring Office
Hall
Printer monitoring
Do your employees have a free hand at printing? Have
you ever wondered how many sensitive documents might
be printed during one workday? Has it ever occurred to
you that some of your employees can easily use company
printers for their personal use? Gain an insight into how
your company printers are used and who of your personnel
consumes most of printing resources. Uncover leaks of sensi-
tive documents and save operating costs.
Control and EnforceSafetica Endpoint Security restricts em-
ployee privileges so that they are allowed to perform only
the tasks related to their job. It assesses their activity, blocks
undesirable operations and informs the management about
incurred problems. So, with Safetica you will be able to pro- With Safetica you can block any undesirable webpages.
actively reduce labor costs, save company resources and Therefore, your personnel will not be tempted to while away
eliminate problems resulting from your employees behaving their working hours by playing online games or visiting so-
irresponsibly. cial networks.
Control and Enforce • Website Blocking based on Categories and Keywords
Safetica Endpoint Security restricts employee privileges so • Detailed Website Categorization
that they are allowed to perform only the tasks related to • Blocking of HTTPS connection
their job. It assesses their activity, blocks undesirable opera-
tions and informs the management about incurred problems. Print control
So, with Safetica you will be able to proactively reduce la- Disable printing of personal files and prevent unauthorized
bor costs, save company resources and eliminate problems printing of sensitive documents. Are your employees con-
resulting from your employees behaving irresponsibly. vinced that they are free to print anything, even if it’s only
for their personal use? Get your company printers under
Application control control. By seeing who prints what, you can reduce print-
By installing illegal and often dangerous applications your ing costs and prevent unauthorized printing of confidential
employees pose a threat to your company’s security. Get rid documents.
of pirate programs, malware, games and other undesirable
applications that are not suitable for a company environ- • Printer Access Blocking
ment. Prevent your staff from endangering your company • Block printing of selected documents
and pick only those applications which are appropriate for
their tasks. Data Loss PreventionSafetica Endpoint Security is the ulti-
mate shield protecting your confident information. It keeps
• Application Blocking your data safe not only from unauthorized access, but also
• Extensive Application Database from people who have the privileges to access it and work
with it. For, although your employees may have the rights
Web control to use the data, their intentions may not always be as pure
Would you be surprised, if you found out your employees as the driven snow. Safetica Endpoint DLP is here to protect
spend a large part of their working hours visiting websites you. It helps you to prevent financial losses and damage to
not related to their work? Cut off unproductive activities. your company reputation.
3. Data Leak Prevention Endpoint DLP
Safetica Endpoint Security is the ultimate shield protecting
your confident information. It keeps your data safe not only
from unauthorized access, but also from people who have
the privileges to access it and work with it. For, although Creation
your employees may have the rights to use the data, their New data immediately
secured.
intentions may not always be as pure as the driven snow.
Safetica Endpoint DLP is here to protect you. It helps you Deleting Transport
to prevent financial losses and damage to your company Erase redundant
data reliably.
Keep information
safe on the go.
reputation.
Storage Usage
Device control All data encrypted Prevent illegitimate
Stop sensitive information leaking from your company. Pre- securely. data usage.
vent your staff from taking your confidential information and
storing them on unknown flash drives, mobile phones or any
other devices. You will not only avoid sensitive data leaks,
but you will also prevent attacks of viruses and other dan-
gerous applications. Devices often carry malicious software
and usually, their owners are not even aware of this infec-
tion. Restrict the use of unknown devices and select only
those devices which are essential for your employees to do
their work. Every attempt to connect an unauthorized device
is blocked, logged and reported.
• Access Control
• Identification and Blocking of Specific USB and Blue-
tooth Devices
Data at rest protection
Protect your company from leaks of data stored on worksta-
tions or servers. You decide who has access to company job. Prevent third party applications from spying on your
files and what they can do with them. Safetica also enables confidential information as it is being processed on client
you to safely delete the data which is no longer needed so stations.
that it cannot be recovered.
• DLP Rules
• Disk Encryption • Anti-KeyLogger
• Data Shredder • Intelligent Data Classification
• Application Data Access Control
Data in motion protection
How many of your employees take your sensitive informa- And much more…
tion away on portable devices? And how many of them
have already lost such a portable disk or had a laptop sto- Time efficient security
len? Protect your sensitive company information even if it is Forget all the slow and difficult processes of integrating se-
miles away from you. With Safetica Endpoint Security, your curity software into company infrastructure. Safetica End-
data is safe all the time and no third party can access it. point Security is designed specifically not to hinder you or
Make sure that no one will ever find a flash drive with your your staff at work. Your security manager will save time he/
company’s confidential data lying around on a street. she would otherwise have to spend on setting security poli-
cies. Our software does not limit your employees in their
• Portable Disk Encryption usual work at all. Your network administrators will almost
• The Safest Encryption Algorithms immediately be able to set the security software so that it
complies with local laws and relevant industrial standards.
Data in use protection
Your sensitive information is most vulnerable while your em- • Easy-to-use Setting Templates
ployees are working with it. If they have legitimate access • Task Scheduler
to your data, there is nothing to stop them from copying it • Remote Client Administration
onto a flash drive or forwarding it via an e-mail. Do not • Automatic Alerts
allow your personnel to misuse their access rights. Prevent • Detailed Access Control to Administration and Supervi-
them from making unauthorized operations with your data sion
and check if they really use it only for tasks related to their • Optimization for Large Networks Installation