IntellAct Tracking deviations in user workflows based on predetermined thresholds (volume of copied files, use of HTTP traffic, etc.)
GOST Encryption Algorithm The GOST 28147-89 (RFC 5830) encryption is now available
Password Manager Central storage of website account passwords on a workstation
Permanent Encryption The new encryption mode that requires the Endpoint Security agent to be installed on the workstation to decrypt the file’s content.
Key Features
Automated monitoring of the weak spots in the IT infrastructure
Applications whitelisting or blacklisting
Fast and reliable data encryption
Managing access to external devices and files
Secure data destruction
Secure operations in the cloud
Centralized security policies for all branch offices
Encryption of files on devices and in the cloud: prevents loss of confidential data and decreases financial risks
Monitoring the integrity of the IT infrastructure: limits the unauthorized use of software and the use of company’s assets for personal gain
Reduced expenses: provides the big picture of how the company’s IT assets are used, and allows saving on software licenses and hardware, as well as on inefficient staff