SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
ApplicationPro
ApplicationPro stops the execution of unauthorized applications

The uncontrolled use of applications is a growing problem for businesses. applicationpro ® can tackle this problem
from 2 directions: a) by only allowing the start of applications that may be executed in your corporate network
(whitelisting) b) by only allowing the start of applications that have not been prohibited (blacklist / procedures). Af-
ter all, the unintentional running of malware and spyware can cause enormous economic damage, while the installa-
tion of unlicensed software by users generally leads to higher support costs and may have unpleasant consequences
at the next software audit.


YOUR BENEFITS
   Applicationpro does not rely on the
   signature of malicious applications, it
   blocks all unauthorized programs di-
   rectly thus complementing your anti-
   virus solution.
   Only applications approved by the IT
   management can be started.
   Helpdesk incidents caused by unau-
   thorized software are eliminated.

SELECTED FEATURES
    Intelligent Learning mode records all
    programs that have been used by a
    user or a user group within a specified
    time frame. This allows you to easily
    and effortlessly create user group spe-
    cific white lists.
    Simple, wizard-assisted creation of
    software packages.                                      The Learning Mode facilitates administration by automatically recording all
                                                            applications that are executed by members of a specific user group within a
    Flexible assignment of software pack-                                               defined time frame.
    ages to roles such as marketing or ad-
    ministration.




 Risks caused by Private Usage
    Many employees also use their company
    computers for private purposes, which is
    often tolerated by employers. Without
    central management, however, it is diffi-
    cult to draw clear boundaries. Costs and
    risks arise for the employer when ...
    employees play games or watch movies
    during working hours.
    virus-infected software, video clips or
    games are installed.
    unlicensed software is installed.
    support staff spends time to resolve
    problems caused by unauthorized soft-
    ware.

                                                          Registered applications can be grouped by manufacturer, or by using any other
cynapspro                                                           Endpoint Data Protection

cynapspro develops software solutions for reliable
endpoint data protection in the enterprise network
and covers the following areas:
DevicePro prevents data loss through open ports and
external storage devices.
CryptionPro encrypts and protects your company
data on mobile storage media – fully automated.
CryptionPro HDD protects your company data by en-
crypting the hard drive.
ApplicationPro blocks unwanted applications and
prevents the use of unlicensed software.
ErasePro ensures that deleted files are not recover-
able.
PowerPro cuts energy costs and reports suspicious
activity.

The following features distinguish all cynapspro                    pected data abuse or loss, cynapspro knows which
solutions:                                                          files have been accessed, by whom and when.

Intuitive Management Console                                        Minimal System Requirements
The single user-friendly Management Console is                      Apart from a SQL database (the free MSDE or SQL
largely self-explanatory and only a minimum of train-               Server 2005 Express edition are fully sufficient), there
ing is required. The clear and concise structure allows             is no additional software required, such as the IIS
the compilation of complex setting with just a few                  Server or .NET client. Consequently, no new vulner-
mouse clicks.                                                       abilities are introduced by installing additional back
                                                                    office software and memory and CPU utilization is
Real-Time Management                                                minimal.
All changes to access permissions will be immediately
pushed out to the clients and stored in the cynapspro               Secure Kernel Driver Technology
database. Users don’t need to restart their machines                The secure cynapspro® kernel driver technology is
or even connect to the company network in order to                  loaded into the operating system during the boot
upgrade their usage rights.                                         sequence and thus ensures that the service running
                                                                    on the client is not visible to the end user. It can only
Rights Management at Group Level, User Level or                     be stopped or uninstalled by an authorized Adminis-
Computer Level                                                      trator.
Reduce your administrative effort. Manage individual
access rights directly with the respective users,                   Integration with Third Party Applications
groups or computers.                                                An XML interface allows the allocation of access per-
                                                                    missions from an existing customer Helpdesk or Ser-
Synchronization of User Directories                                 vice Desk implementation in a fully automated way,
Existing users and user group definitions from Micro-               leveraging existing processes, approval workflows,
soft Active Directory or Novell eDirectory are im-                  notifications and management reports. There will be
ported by the cynapspro server thus reducing the                    no need for service desk workers to use an additional
workload for defining user groups for Access Client                 console.
Lists (ACLs) as well as the sources of error.
                                                                    Distributed Environments
Full Audit Log                                                      Several mutually replicating cynapspro servers pro-
Password-protected, detailed access statistics with                 vide load balancing capabilities in enterprise environ-
filter and sort order functionality. In case of sus-                ments.

Free Trial Version                                                  Contact
On the cynapspro website, we offer a full version                   cynapspro GmbH
of our software for download, including a free 5-                   Am Hardtwald 1
user license.                                                       D-76275 Ettlingen
Please contact us if you are interested in testing                  Tel.: +49 7243 / 945-250
our software in a larger environment.                               Email: contact@cynapspro.com
                                                                    Internet: www.cynapspro.com

                                March 2010 - Copyright cynapspro GmbH 2010—All rights reserved.

Más contenido relacionado

La actualidad más candente

2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overviewfannaq786
 
Bus Tour Windows 7 Deck (Full)
Bus Tour   Windows 7 Deck (Full)Bus Tour   Windows 7 Deck (Full)
Bus Tour Windows 7 Deck (Full)Stephen L Rose
 
Sccm 2012
Sccm 2012Sccm 2012
Sccm 2012ebuc
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012Nicolai Henriksen
 
Microsoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 InstallationMicrosoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 InstallationShahab Al Yamin Chawdhury
 
System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewAmit Gatenyo
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaMicrosoft Singapore
 
NIST Definition of Cloud Computing
NIST Definition of Cloud ComputingNIST Definition of Cloud Computing
NIST Definition of Cloud ComputingScientia Groups
 
Application Virtualization overview - BayCUG
Application Virtualization overview - BayCUGApplication Virtualization overview - BayCUG
Application Virtualization overview - BayCUGDenis Gundarev
 
CENTRALIZED MANAGEMENT APPLIANCES
CENTRALIZED MANAGEMENT APPLIANCESCENTRALIZED MANAGEMENT APPLIANCES
CENTRALIZED MANAGEMENT APPLIANCES Array Networks
 
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution BriefDATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief Array Networks
 
Ehealth systemedge-product-brief-us
Ehealth systemedge-product-brief-usEhealth systemedge-product-brief-us
Ehealth systemedge-product-brief-usgopi01
 
Riding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_pRiding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_pMicrosoft Singapore
 
Application Virtualization presentation
Application Virtualization presentationApplication Virtualization presentation
Application Virtualization presentationATWIINE Simon Alex
 
SCOM: The Unsung Hero of the System Center Suite April 24, 2013
SCOM: The Unsung Hero of the System Center Suite April 24, 2013SCOM: The Unsung Hero of the System Center Suite April 24, 2013
SCOM: The Unsung Hero of the System Center Suite April 24, 2013C/D/H Technology Consultants
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component C/D/H Technology Consultants
 

La actualidad más candente (20)

2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview
 
Bus Tour Windows 7 Deck (Full)
Bus Tour   Windows 7 Deck (Full)Bus Tour   Windows 7 Deck (Full)
Bus Tour Windows 7 Deck (Full)
 
Sccm 2012
Sccm 2012Sccm 2012
Sccm 2012
 
Installation
InstallationInstallation
Installation
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012
 
Microsoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 InstallationMicrosoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 Installation
 
System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 Overview
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
NIST Definition of Cloud Computing
NIST Definition of Cloud ComputingNIST Definition of Cloud Computing
NIST Definition of Cloud Computing
 
Install Desk Product Information
Install Desk Product InformationInstall Desk Product Information
Install Desk Product Information
 
Application Virtualization overview - BayCUG
Application Virtualization overview - BayCUGApplication Virtualization overview - BayCUG
Application Virtualization overview - BayCUG
 
CENTRALIZED MANAGEMENT APPLIANCES
CENTRALIZED MANAGEMENT APPLIANCESCENTRALIZED MANAGEMENT APPLIANCES
CENTRALIZED MANAGEMENT APPLIANCES
 
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution BriefDATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
 
Ehealth systemedge-product-brief-us
Ehealth systemedge-product-brief-usEhealth systemedge-product-brief-us
Ehealth systemedge-product-brief-us
 
Riding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_pRiding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_p
 
SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
 
Application Virtualization presentation
Application Virtualization presentationApplication Virtualization presentation
Application Virtualization presentation
 
What is My easy center 2.0 for SCCM ?
What is My easy center 2.0 for SCCM ?What is My easy center 2.0 for SCCM ?
What is My easy center 2.0 for SCCM ?
 
SCOM: The Unsung Hero of the System Center Suite April 24, 2013
SCOM: The Unsung Hero of the System Center Suite April 24, 2013SCOM: The Unsung Hero of the System Center Suite April 24, 2013
SCOM: The Unsung Hero of the System Center Suite April 24, 2013
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component
 

Destacado

RTE_Extremadura
RTE_ExtremaduraRTE_Extremadura
RTE_Extremaduraddiazmur
 
HARDWARE
HARDWAREHARDWARE
HARDWARERocio
 
Tratamiento de imágenes
Tratamiento de imágenesTratamiento de imágenes
Tratamiento de imágenesNoemiYMarta
 
La ley sopa ,pipa y el cierre
La ley sopa ,pipa y el cierreLa ley sopa ,pipa y el cierre
La ley sopa ,pipa y el cierreJoseAndreZuta
 
Trabajo digital en la plataforma HELVIA con DESCARTES, EDA 2007
Trabajo digital en la plataforma HELVIA con DESCARTES, EDA 2007Trabajo digital en la plataforma HELVIA con DESCARTES, EDA 2007
Trabajo digital en la plataforma HELVIA con DESCARTES, EDA 2007RED Descartes
 
Conferencia%20 Latapi%20 Merida%2007
Conferencia%20 Latapi%20 Merida%2007Conferencia%20 Latapi%20 Merida%2007
Conferencia%20 Latapi%20 Merida%2007SEP
 
Ii Responsab Social Etica(2)
Ii Responsab Social Etica(2)Ii Responsab Social Etica(2)
Ii Responsab Social Etica(2)forevervicux
 
Tarjetas digitales 2.0
Tarjetas digitales 2.0Tarjetas digitales 2.0
Tarjetas digitales 2.0Erick Cruz
 
Educacion Virtual
Educacion VirtualEducacion Virtual
Educacion Virtualguestbb1580
 
Bloque 1 introducción
Bloque 1   introducciónBloque 1   introducción
Bloque 1 introducciónTIC System
 
que realiza el personal cuando entra un paciente al hospital
que realiza el personal cuando entra un paciente al hospitalque realiza el personal cuando entra un paciente al hospital
que realiza el personal cuando entra un paciente al hospitalBrizeida Garcia
 
Conceptos generales de las ecuaciones difernciales de primer grado
Conceptos generales de las ecuaciones difernciales de primer gradoConceptos generales de las ecuaciones difernciales de primer grado
Conceptos generales de las ecuaciones difernciales de primer gradoSantiago Morales Ruiz
 

Destacado (20)

RTE_Extremadura
RTE_ExtremaduraRTE_Extremadura
RTE_Extremadura
 
HARDWARE
HARDWAREHARDWARE
HARDWARE
 
Tratamiento de imágenes
Tratamiento de imágenesTratamiento de imágenes
Tratamiento de imágenes
 
La ley sopa ,pipa y el cierre
La ley sopa ,pipa y el cierreLa ley sopa ,pipa y el cierre
La ley sopa ,pipa y el cierre
 
Trabajo digital en la plataforma HELVIA con DESCARTES, EDA 2007
Trabajo digital en la plataforma HELVIA con DESCARTES, EDA 2007Trabajo digital en la plataforma HELVIA con DESCARTES, EDA 2007
Trabajo digital en la plataforma HELVIA con DESCARTES, EDA 2007
 
Clase2
Clase2Clase2
Clase2
 
Página Web
Página WebPágina Web
Página Web
 
Conferencia%20 Latapi%20 Merida%2007
Conferencia%20 Latapi%20 Merida%2007Conferencia%20 Latapi%20 Merida%2007
Conferencia%20 Latapi%20 Merida%2007
 
Violencia
ViolenciaViolencia
Violencia
 
Ii Responsab Social Etica(2)
Ii Responsab Social Etica(2)Ii Responsab Social Etica(2)
Ii Responsab Social Etica(2)
 
Miprimerapagina
MiprimerapaginaMiprimerapagina
Miprimerapagina
 
Tarjetas digitales 2.0
Tarjetas digitales 2.0Tarjetas digitales 2.0
Tarjetas digitales 2.0
 
Educacion Virtual
Educacion VirtualEducacion Virtual
Educacion Virtual
 
Presentación wiki 2
Presentación wiki 2Presentación wiki 2
Presentación wiki 2
 
Redaccion
RedaccionRedaccion
Redaccion
 
Realismo
RealismoRealismo
Realismo
 
Bloque 1 introducción
Bloque 1   introducciónBloque 1   introducción
Bloque 1 introducción
 
que realiza el personal cuando entra un paciente al hospital
que realiza el personal cuando entra un paciente al hospitalque realiza el personal cuando entra un paciente al hospital
que realiza el personal cuando entra un paciente al hospital
 
Proyecto6
Proyecto6Proyecto6
Proyecto6
 
Conceptos generales de las ecuaciones difernciales de primer grado
Conceptos generales de las ecuaciones difernciales de primer gradoConceptos generales de las ecuaciones difernciales de primer grado
Conceptos generales de las ecuaciones difernciales de primer grado
 

Similar a ApplicationPro Flyer English

DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer Englishcynapspro GmbH
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTrihedral
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application VirtualizationAmit Gatenyo
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfImamBahrudin5
 
Thin Provisioning Comparison
Thin Provisioning ComparisonThin Provisioning Comparison
Thin Provisioning Comparisonlneut03
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide Lauren Bell
 
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del RansomwareWebinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del RansomwareNetgear Italia
 
AV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewAV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewJermund Ottermo
 
What is Application & Server Virtualisation
What is Application & Server VirtualisationWhat is Application & Server Virtualisation
What is Application & Server VirtualisationDAYWATCHER.COM
 
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfAgaram Technologies
 
Cisco and The Applied Group Point of View
Cisco and The Applied Group Point of ViewCisco and The Applied Group Point of View
Cisco and The Applied Group Point of ViewDavid Barry
 
AVG Managed Workplace 9.1 Fact Sheet
AVG Managed Workplace 9.1 Fact SheetAVG Managed Workplace 9.1 Fact Sheet
AVG Managed Workplace 9.1 Fact SheetAVG Technologies
 
Představení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruPředstavení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruMarketingArrowECS_CZ
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 

Similar a ApplicationPro Flyer English (20)

DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer English
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA software
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application Virtualization
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
Thin Provisioning Comparison
Thin Provisioning ComparisonThin Provisioning Comparison
Thin Provisioning Comparison
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
 
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del RansomwareWebinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
 
Anti Key Logging And Real Time Encryption Software
Anti Key Logging And Real Time Encryption SoftwareAnti Key Logging And Real Time Encryption Software
Anti Key Logging And Real Time Encryption Software
 
AV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewAV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software review
 
What is Application & Server Virtualisation
What is Application & Server VirtualisationWhat is Application & Server Virtualisation
What is Application & Server Virtualisation
 
unit5final
unit5finalunit5final
unit5final
 
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
 
MBESProductSheet (1)
MBESProductSheet (1)MBESProductSheet (1)
MBESProductSheet (1)
 
Cisco and The Applied Group Point of View
Cisco and The Applied Group Point of ViewCisco and The Applied Group Point of View
Cisco and The Applied Group Point of View
 
Virtualization 101
Virtualization 101Virtualization 101
Virtualization 101
 
Darwin Overview
Darwin OverviewDarwin Overview
Darwin Overview
 
AVG Managed Workplace 9.1 Fact Sheet
AVG Managed Workplace 9.1 Fact SheetAVG Managed Workplace 9.1 Fact Sheet
AVG Managed Workplace 9.1 Fact Sheet
 
Představení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruPředstavení Oracle SPARC Miniclusteru
Představení Oracle SPARC Miniclusteru
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 

Más de cynapspro GmbH

Cynapspro Endpoint Data Protection 2011 - Step By Step Anleitung DevicePro un...
Cynapspro Endpoint Data Protection 2011 - Step By Step Anleitung DevicePro un...Cynapspro Endpoint Data Protection 2011 - Step By Step Anleitung DevicePro un...
Cynapspro Endpoint Data Protection 2011 - Step By Step Anleitung DevicePro un...cynapspro GmbH
 
Cynapspro endpoint data protection 2011 step by-step anleitung device pro und...
Cynapspro endpoint data protection 2011 step by-step anleitung device pro und...Cynapspro endpoint data protection 2011 step by-step anleitung device pro und...
Cynapspro endpoint data protection 2011 step by-step anleitung device pro und...cynapspro GmbH
 
cynapspro endpoint data protection 2010 - technical specifications
cynapspro endpoint data protection 2010 - technical specificationscynapspro endpoint data protection 2010 - technical specifications
cynapspro endpoint data protection 2010 - technical specificationscynapspro GmbH
 
cynapspro endpoint data protection - user guide
cynapspro endpoint data protection -  user guidecynapspro endpoint data protection -  user guide
cynapspro endpoint data protection - user guidecynapspro GmbH
 
cynapspro endpoint data protection - installation guide
cynapspro endpoint data protection - installation guidecynapspro endpoint data protection - installation guide
cynapspro endpoint data protection - installation guidecynapspro GmbH
 
cynapspro endpoint data protection 2010 - Bedienungsleitfaden
cynapspro endpoint data protection 2010 - Bedienungsleitfadencynapspro endpoint data protection 2010 - Bedienungsleitfaden
cynapspro endpoint data protection 2010 - Bedienungsleitfadencynapspro GmbH
 
Cynapspro data endpoint protection - Anbindung von Drittsysteme
Cynapspro data endpoint protection - Anbindung von DrittsystemeCynapspro data endpoint protection - Anbindung von Drittsysteme
Cynapspro data endpoint protection - Anbindung von Drittsystemecynapspro GmbH
 
cynapspro data endpoint protection 2010 - Installationsleitfaden
cynapspro data endpoint protection 2010 - Installationsleitfadencynapspro data endpoint protection 2010 - Installationsleitfaden
cynapspro data endpoint protection 2010 - Installationsleitfadencynapspro GmbH
 
CryptionPro HDD Flyer deutsch
CryptionPro HDD Flyer deutschCryptionPro HDD Flyer deutsch
CryptionPro HDD Flyer deutschcynapspro GmbH
 
DevicePro Flyer deutsch
DevicePro Flyer deutschDevicePro Flyer deutsch
DevicePro Flyer deutschcynapspro GmbH
 
CryptionPro HDD Flyer deutsch
CryptionPro HDD Flyer deutschCryptionPro HDD Flyer deutsch
CryptionPro HDD Flyer deutschcynapspro GmbH
 
PowerPro Flyer deutsch
PowerPro Flyer deutschPowerPro Flyer deutsch
PowerPro Flyer deutschcynapspro GmbH
 
ErasePro Flyer deutsch
ErasePro Flyer deutschErasePro Flyer deutsch
ErasePro Flyer deutschcynapspro GmbH
 
ApplicationPro Flyer deutsch
ApplicationPro Flyer deutschApplicationPro Flyer deutsch
ApplicationPro Flyer deutschcynapspro GmbH
 
Screenshots von DevicePro 2009
Screenshots von DevicePro 2009Screenshots von DevicePro 2009
Screenshots von DevicePro 2009cynapspro GmbH
 
Screenshots von DevicePro 2009
Screenshots von DevicePro 2009Screenshots von DevicePro 2009
Screenshots von DevicePro 2009cynapspro GmbH
 
DevicePro Ultimate 2009 - Efficient Data Loss Prevention Solution
DevicePro Ultimate 2009 - Efficient Data Loss Prevention SolutionDevicePro Ultimate 2009 - Efficient Data Loss Prevention Solution
DevicePro Ultimate 2009 - Efficient Data Loss Prevention Solutioncynapspro GmbH
 
DevicePro Ultimate 2009 - Die Loesung - Ihre Vorteile - Das Unternehmen
DevicePro Ultimate 2009 - Die Loesung - Ihre Vorteile - Das UnternehmenDevicePro Ultimate 2009 - Die Loesung - Ihre Vorteile - Das Unternehmen
DevicePro Ultimate 2009 - Die Loesung - Ihre Vorteile - Das Unternehmencynapspro GmbH
 

Más de cynapspro GmbH (19)

Cynapspro Endpoint Data Protection 2011 - Step By Step Anleitung DevicePro un...
Cynapspro Endpoint Data Protection 2011 - Step By Step Anleitung DevicePro un...Cynapspro Endpoint Data Protection 2011 - Step By Step Anleitung DevicePro un...
Cynapspro Endpoint Data Protection 2011 - Step By Step Anleitung DevicePro un...
 
Cynapspro endpoint data protection 2011 step by-step anleitung device pro und...
Cynapspro endpoint data protection 2011 step by-step anleitung device pro und...Cynapspro endpoint data protection 2011 step by-step anleitung device pro und...
Cynapspro endpoint data protection 2011 step by-step anleitung device pro und...
 
cynapspro endpoint data protection 2010 - technical specifications
cynapspro endpoint data protection 2010 - technical specificationscynapspro endpoint data protection 2010 - technical specifications
cynapspro endpoint data protection 2010 - technical specifications
 
cynapspro endpoint data protection - user guide
cynapspro endpoint data protection -  user guidecynapspro endpoint data protection -  user guide
cynapspro endpoint data protection - user guide
 
cynapspro endpoint data protection - installation guide
cynapspro endpoint data protection - installation guidecynapspro endpoint data protection - installation guide
cynapspro endpoint data protection - installation guide
 
cynapspro endpoint data protection 2010 - Bedienungsleitfaden
cynapspro endpoint data protection 2010 - Bedienungsleitfadencynapspro endpoint data protection 2010 - Bedienungsleitfaden
cynapspro endpoint data protection 2010 - Bedienungsleitfaden
 
Cynapspro data endpoint protection - Anbindung von Drittsysteme
Cynapspro data endpoint protection - Anbindung von DrittsystemeCynapspro data endpoint protection - Anbindung von Drittsysteme
Cynapspro data endpoint protection - Anbindung von Drittsysteme
 
cynapspro data endpoint protection 2010 - Installationsleitfaden
cynapspro data endpoint protection 2010 - Installationsleitfadencynapspro data endpoint protection 2010 - Installationsleitfaden
cynapspro data endpoint protection 2010 - Installationsleitfaden
 
CryptionPro HDD Flyer deutsch
CryptionPro HDD Flyer deutschCryptionPro HDD Flyer deutsch
CryptionPro HDD Flyer deutsch
 
DevicePro Flyer deutsch
DevicePro Flyer deutschDevicePro Flyer deutsch
DevicePro Flyer deutsch
 
CryptionPro HDD Flyer deutsch
CryptionPro HDD Flyer deutschCryptionPro HDD Flyer deutsch
CryptionPro HDD Flyer deutsch
 
PowerPro Flyer deutsch
PowerPro Flyer deutschPowerPro Flyer deutsch
PowerPro Flyer deutsch
 
ErasePro Flyer deutsch
ErasePro Flyer deutschErasePro Flyer deutsch
ErasePro Flyer deutsch
 
Cryption proflyer de
Cryption proflyer deCryption proflyer de
Cryption proflyer de
 
ApplicationPro Flyer deutsch
ApplicationPro Flyer deutschApplicationPro Flyer deutsch
ApplicationPro Flyer deutsch
 
Screenshots von DevicePro 2009
Screenshots von DevicePro 2009Screenshots von DevicePro 2009
Screenshots von DevicePro 2009
 
Screenshots von DevicePro 2009
Screenshots von DevicePro 2009Screenshots von DevicePro 2009
Screenshots von DevicePro 2009
 
DevicePro Ultimate 2009 - Efficient Data Loss Prevention Solution
DevicePro Ultimate 2009 - Efficient Data Loss Prevention SolutionDevicePro Ultimate 2009 - Efficient Data Loss Prevention Solution
DevicePro Ultimate 2009 - Efficient Data Loss Prevention Solution
 
DevicePro Ultimate 2009 - Die Loesung - Ihre Vorteile - Das Unternehmen
DevicePro Ultimate 2009 - Die Loesung - Ihre Vorteile - Das UnternehmenDevicePro Ultimate 2009 - Die Loesung - Ihre Vorteile - Das Unternehmen
DevicePro Ultimate 2009 - Die Loesung - Ihre Vorteile - Das Unternehmen
 

Último

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Último (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

ApplicationPro Flyer English

  • 1. ApplicationPro ApplicationPro stops the execution of unauthorized applications The uncontrolled use of applications is a growing problem for businesses. applicationpro ® can tackle this problem from 2 directions: a) by only allowing the start of applications that may be executed in your corporate network (whitelisting) b) by only allowing the start of applications that have not been prohibited (blacklist / procedures). Af- ter all, the unintentional running of malware and spyware can cause enormous economic damage, while the installa- tion of unlicensed software by users generally leads to higher support costs and may have unpleasant consequences at the next software audit. YOUR BENEFITS Applicationpro does not rely on the signature of malicious applications, it blocks all unauthorized programs di- rectly thus complementing your anti- virus solution. Only applications approved by the IT management can be started. Helpdesk incidents caused by unau- thorized software are eliminated. SELECTED FEATURES Intelligent Learning mode records all programs that have been used by a user or a user group within a specified time frame. This allows you to easily and effortlessly create user group spe- cific white lists. Simple, wizard-assisted creation of software packages. The Learning Mode facilitates administration by automatically recording all applications that are executed by members of a specific user group within a Flexible assignment of software pack- defined time frame. ages to roles such as marketing or ad- ministration. Risks caused by Private Usage Many employees also use their company computers for private purposes, which is often tolerated by employers. Without central management, however, it is diffi- cult to draw clear boundaries. Costs and risks arise for the employer when ... employees play games or watch movies during working hours. virus-infected software, video clips or games are installed. unlicensed software is installed. support staff spends time to resolve problems caused by unauthorized soft- ware. Registered applications can be grouped by manufacturer, or by using any other
  • 2. cynapspro Endpoint Data Protection cynapspro develops software solutions for reliable endpoint data protection in the enterprise network and covers the following areas: DevicePro prevents data loss through open ports and external storage devices. CryptionPro encrypts and protects your company data on mobile storage media – fully automated. CryptionPro HDD protects your company data by en- crypting the hard drive. ApplicationPro blocks unwanted applications and prevents the use of unlicensed software. ErasePro ensures that deleted files are not recover- able. PowerPro cuts energy costs and reports suspicious activity. The following features distinguish all cynapspro pected data abuse or loss, cynapspro knows which solutions: files have been accessed, by whom and when. Intuitive Management Console Minimal System Requirements The single user-friendly Management Console is Apart from a SQL database (the free MSDE or SQL largely self-explanatory and only a minimum of train- Server 2005 Express edition are fully sufficient), there ing is required. The clear and concise structure allows is no additional software required, such as the IIS the compilation of complex setting with just a few Server or .NET client. Consequently, no new vulner- mouse clicks. abilities are introduced by installing additional back office software and memory and CPU utilization is Real-Time Management minimal. All changes to access permissions will be immediately pushed out to the clients and stored in the cynapspro Secure Kernel Driver Technology database. Users don’t need to restart their machines The secure cynapspro® kernel driver technology is or even connect to the company network in order to loaded into the operating system during the boot upgrade their usage rights. sequence and thus ensures that the service running on the client is not visible to the end user. It can only Rights Management at Group Level, User Level or be stopped or uninstalled by an authorized Adminis- Computer Level trator. Reduce your administrative effort. Manage individual access rights directly with the respective users, Integration with Third Party Applications groups or computers. An XML interface allows the allocation of access per- missions from an existing customer Helpdesk or Ser- Synchronization of User Directories vice Desk implementation in a fully automated way, Existing users and user group definitions from Micro- leveraging existing processes, approval workflows, soft Active Directory or Novell eDirectory are im- notifications and management reports. There will be ported by the cynapspro server thus reducing the no need for service desk workers to use an additional workload for defining user groups for Access Client console. Lists (ACLs) as well as the sources of error. Distributed Environments Full Audit Log Several mutually replicating cynapspro servers pro- Password-protected, detailed access statistics with vide load balancing capabilities in enterprise environ- filter and sort order functionality. In case of sus- ments. Free Trial Version Contact On the cynapspro website, we offer a full version cynapspro GmbH of our software for download, including a free 5- Am Hardtwald 1 user license. D-76275 Ettlingen Please contact us if you are interested in testing Tel.: +49 7243 / 945-250 our software in a larger environment. Email: contact@cynapspro.com Internet: www.cynapspro.com March 2010 - Copyright cynapspro GmbH 2010—All rights reserved.