IP-guard Main Feature
Total Control : Manage endpoint workstation operation activities, software and hardware assets,
remote control and maintenance via one single console
Active Recording : Record various types of endpoint workstation operation and activities according to the
defined policies. Endpoint workstation’s hardware and software asset changes and
screen history are also included
Complete Auditing : Automatically analyse endpoint workstation's usage and provide various types of
statistics and reports. Reports also include Windows update information, Windows
vulnerability and software license information
System Requirements
Components Software Requirements Hardware Requirements
Database SQL Server 2005 SP1 / 2008 / 2008 R2 /
2012 / 2014 Processor: Dual-Core 2.0 GHz
Memory: 4 GB
Windows Server 2003 SP1 / 2008 / 2008 R2 / Free Disk Space: 50GB
Server
2012 / 2012 R2
Windows XP / Vista / 7 / 8.x / 10 Processor: Pentium 4 1.3GHz
Console Windows Server 2003 / 2008 / 2008 R2 / Memory: 1 GB
2012 / 2012 R2 Free Disk Space: 10GB
Windows XP / Vista / 7 / 8.x / 10 Processor: Pentium 4 1.3GHz
Agent Windows Server 2003 / 2008 / 2008 R2 / Memory: 1 GB
2012 / 2012 R2 Free Disk Space: 40GB Complete Endpoint Management
Automatically collect endpoint computer Cross exam screen history with event logs Control Record Audit
information and provide accurate asset information
Remote maintenance reduces travel cost Easy to use interface reduces administrator
work load
14 Modules to completely safe guard corporate Background Recording
environment
Comprehensive logs help to identify user Flexible product design
behavior and audit
C O M P U T E X Ta i p e i 2 0 1 0 C N E T Ed i t o r s ' R a ti n g
B e s t C h o i c e Aw a r d 4.5 stars
TEC Solutions Limited Authorized Reseller Xan IT Solutions Co., L td.
www.tecsols.com 7th Floor, Building 18, Myanmar ICT Park ,
Hlaing Township, Yangon, Myanmar
TEL +886 2 7720-7888
Ph : +95 1 652270, +95 1 652239
FAX +886 2 7720-7858
Fax : +95 1 652271
MAIL
[email protected] URL : www.xan.com.mm
[email protected] Mail :
[email protected]Copyright © 2000-2016 TEC Solutions Limited. All Rights Reserved.
Website Management Screen Monitoring Document Management
. Restrict document access rights by computer, user name,
. Supports over 40 different types of Web browser . Immediate response to unexpected matters
disk type, path, application or time zone
. Control browsing behavior and prevent end users . Monitor up to 16 screens at once
. Record document operation activities for future audits
Control
uploading sensitive information (HTTP/FTP) . Trigger screen recording by application
. Back up before delete, modify, copy to ensure document
. Understand end users browsing pattern and improve . Screen history can be retrieved by event log safety
Control•Record•Audit
Audit
productivity Total control of end
View statistic
user behavior
The Complete Solution to Endpoint Security
and Report
Application Management IP-guards 14 modules are a comprehensive When facing the ever evolving threat to secure information
management solution to counter all security, organisations need an effective tool to build a secure
. Restrict or limit IM, P2P and any other related applications problems endpoint computers may and efficient network environment. IP-guards total control,
. Restrict or limit use of “green” software
encounter, and are also a cost effective way comprehensive logs and efficient auditing will minimise
. Application will remain restricted or limited even if windows
registry, file name or path has been altered to gain control over endpoint computers corporate operational risks and create a safer network
within an enterprise. environment.
IP-guard focuses on endpoint information security by
TEC Solutions Limited
Email Management monitoring and controlling endpoint computer asset
Endpoint Information Security Management System
. Ability to set policies in order to prevent information leakage information, event logs and behavior. IP-guard provides a high
. Ability to back up full email content and attachments
. Supports Webmail/Microsoft Exchange/Lotus note and
Record performance, reliable, automated and easy to use system that
Auto record and captures and controls employee information leakage under
standard mail protocols
comprehensive logs any circumstances which allows administrators to secure and
control the corporate environment.
Basic Management
. Remote computers can be categorized by user name or
. computer name
Effectively prevent changing of system settings, IP/MAC
addresses
. Provide category management and alert feature
IP-guard
The Enterprise Endpoint Security Solution
Asset Management IP-guards 14 modules are a comprehensive management solution to counter all
. Effectively control and manage hardware and problems endpoint computers may encounter, and are also a cost effective way to
software asset information
. Uninstall software on endpoint computers from
gain control over endpoint computers within an enterprise.
our console
. Automatically perform Windows updates and
IP-guard Functionality Description
vulnerability checks
Print Management Instant Message Management
Remote Maintenance . Prevent data leakage by blocking unauthorised . Supports up to 22 different types of Instant Message
Basic Management Basic Information, Basic Control, Event Alerts, Basic Policy, Policy Logs, Event Logs, Desktop Security Management
printing applications
. Software uninstall feature allows administrators Application Management Application Logs, Application Statistics, Application Usage Control, Software Installation Management
. Printed content stored in JPG format, provides . Automatic backup on file sent via Instant Message application
to remove suspicious software un-changeable format for future audit
. Control Instant Message file sharing activities Website Management Web Logs, Website Statistics, Website Control, Upload Control
. Remotely manage and troubleshoot end user Effective way to reduce print costs and prevent
.
computers in order to reduce system downtime wasting of printer resources
Bandwidth Management Traffic Statistics, Bandwidth Control
Document Management Document Operation Logs, Document Operation Control, Document Backup, Share Folder Operation Logs
Removable Storage Management Print Management Print Logs, Printed Content Recording, Print Control, Print Watermarks
Bandwidth Management . Ability to restrict user access to USB storage devices Screen Monitoring Management Instant Screen Snapshot, Multi-screen Monitoring, Screen History Playback
. Control and monitor internet, intranet and custom network range traffic flow . Encrypt files when copied onto USB storage devices
. Control traffic flow to prevent network traffic congestion caused by excessive . Format any USB device into an IP-guard encrypted device Remote Maintenance Remote Maintenance, Remote Control, Remote File Transfer, Software Uninstall
downloading or uploading . Provide removable device connect and disconnect activity log
Device Management Device Control
Network Management Network Communication Control, Intrusion Detection
Email Management Email Logs, Email Control
Instant Message Management Instant Messaging Logs, Instant Message Document Transfer Control
Asset Management Asset / Software License / Windows Patch/Vulnerability Management and Software Deployment, Software Uninstall
Network Management Device Management
. Manage and control network packages to prevent Trojan/Virus specific Removable Device Management Authorize Removable Device, Encrypt Removable Device
. network protocols . Effectively control various types of external devices including Floppy, CD/DVD Rom
drives, parallel port, USB, HUB, SCSI interface, 1394 controller, infrared, Bluetooth,
. Intrusion Detection and Intrusion Prevention
modem, wireless network cards, USB mouse and keyboard, portable device etc.
Note: Support Terminal Server, Thin Client, Multi-screen Computer and Safe Mode
Block specific groups of users to ensure network safety Included in Desktop Security Management
. Ability to control a device by device name
. Prohibit end user adding any new device