InterGuard Employee Computer Monitoring Software Solutions Free Trial Data Loss Prevention
InterGuard – Integrated protection for all internal threats originating from within businesses – features include:
* Record all employee activity & Instantly improve productivity
* Stop confidential data theft & can webmail and USB files
* Block time-wasting websites & Limit use of software appsInterguard is ease of use. There is never any hardware to buy or manage. Their solution is provided in a Software-as-a-Service (SaaS) model so all you have to do is download their software to your desktops and laptops. This process takes only a few minutes and their technical support team is available to help you get set up if you need it. It is worth noting that their solution is flexible enough that you can use your own hardware and host your own data if you prefer. The choice is yours.
Works invisibly and undetectably at each desktop, without impacting central network computer resources
Records all employee communications - Email (including. webmail) & Instant Messaging
Monitors and filters Internet use on and off the network (even on laptops)Blocks or limits applications like P2P, IM
Records and analyzes all keystroke activity, regardless of the application used
Formats all data into easy-to-read reports, making it easy to find and evaluate critical security lapses
Screenshots taken whenever an alert word is typed or read on a webpage
Conclusive, actionable data hard-linked to a specific employee’s actions, with full individualized reporting on an employee’s computer activity
Screen all email (work and personal) and attachments for sensitive data and block if desired
Protect from misuse or misappropriation of trade secrets, Non-Public Personal Information Control or stop use of removable mediaBlock files, based on their content, from being copied to removable media
Protect and enforce policies governing each employee’s computer use, including those that never connect to a network (even laptops)
Easy, intuitive policy creationCoach and educate employees to adopt protocol and best practices for protecting company data
Reports back to secure server over standard HTTPS protocols, instead of network
Identify, track, and control who accesses your data, what data they access, and what they can and cannot do with that dataMonitors and filters Internet use on and off the network (even on laptops)
Blocks or limits applications like P2P, IM
Screenshots taken whenever an alert word is typed or read on a webpage
All Search Terms captured
Works on and off networkRemotely retrieve important files invisibly, using any internet connection
Remotely delete files or an entire hard drive
Secure and confirm deletion to the highest Pentagon standard of unrecoverability
Geo-locate the stolen laptop, in real-time over any internet connection, often with greater accuracy than GPS
Monitor and control everything a thief does – every keystroke they type and file they access will be visable
Lock down laptop after disappearance so files can’t be accessed
Computers
Hardware Stores
Software Warehouse
Magazines Subscription