IP-Guard V4 Manajemen Device

IP-guard Modul Manajemen Device membantu Anda secara efektif mengkontrol izin akses ke berbagai perangkat seperti perangkat storage, perangkat komunikasi, perangkat USB, perangkat Bluetooth, perangkat dial-up, perangkat burning, perangkat network. Ini akan dengan efektif dan efisien menghindari kebocoran data sensitive melalui perangkat tersebut.

Kontrol Perangkat yang Efektif dan Efisien

  • Blok penggunaan perangkat tertentu di tenggang waktu tertentu
  • Blok user tertentu dari penggunaan perangkat yang ditentukan

Peringatan dan Alert yang Instan

  • Informasi peringatan yang bisa disesuaikan
  • Instan pop up peringatan di sisi user jika user berusaha menggunakan perangkat yang dilarang
  • Instan pop up alert ke admin jika ada user yang menggunakan perangkat yang dilarang

Perangkat berikut bisa dikontrol dengan modul manajemen device

Perangkat Storage floppy disk, CD-ROM, CD burner, tape drive, and removable devices (e.g., USB drive, removable hard disk, memory stick, memory card, SD card, MP3 player, and iPod), etc.
Dialup dial-up Connection
Perangkat Komunikasi COM, LPT, USB controller, SCSI controller, 1394 controller, Infrared, PCMICA, Bluetooth, MODEM, Direct Lines.
Perangkat USB USB Keyboard, USB Mouse, USB Modem, USB Image Device, USB CD-ROM, USB Storage, USB Hard Disk, USB LAN Adapter, etc.
Perangkat Network wireless LAN Adapter, PnP Adapter (USB, PCMCIA), virtual CD-ROM and virtual LAN Adapter
Lain-lain Audio devices, virtual CD-ROM, etc.
GeoStudio 3D

GeoStudio 3D

GeoStudio 3D Seequent | The Bentley Subsurface Company Seequent is the subsurface software company within Bentley Systems. Together, we’re helping build a more resilient future by connecting the built world above ground with the hidden world below it. It’s easy to...

Confidential AI

Confidential AI

Confidential AI Confidential AI is a new platform to securely develop and deploy AI models on sensitive data using confidential computing. The solution provides data teams with infrastructure, software, and workflow orchestration to create a secure, on-demand work...

Confidential Data Search

Confidential Data Search

Filesystem Encryption Keep individual files and folders safe to defend against malicious actors and meet compliance.  When it comes to analyzing sensitive data such as financial or medical datasets, organizations have to compromise on security or performance. Current...

GeoStudio 2D

GeoStudio 2D

GeoStudio 2DSeequent | The Bentley Subsurface Company Seequent is the subsurface software company within Bentley Systems. Together, we’re helping build a more resilient future by connecting the built world above ground with the hidden world below it. It’s easy to...

Filesystem Encryption

Filesystem Encryption

Filesystem Encryption Keep individual files and folders safe to defend against malicious actors and meet compliance.  To enhance data loss prevention and comply with privacy regulations, businesses are constantly looking to strengthen their security posture. Many...

Transparent Database Encryption

Transparent Database Encryption

Transparent Database Encryption Fortanix simplified database encryption by providing a single integrated key management and hardware security module (HSM) to manage and store cryptographic keys across all your databases.  In times of relentless cyberattacks and...

Software Original
×

Software-Original.Com

× Contact Us