Ability to Monitor each computer terminal in stealth mode using minimal memory usage and advanced analytics performed in a dedicated server capable of handling 3000-4000 users real-time. Advanced in-built device control capabilities to enforce encrypted data protection on lost or stolen devices including removable media.
By Monitoring and Analyzing patterns of User
Behavior using parameterized red flag patterns
and content monitoring.
By Monitoring and Blocking all modes of leakage of data by content; including emails, uploads and removable media.
By Monitoring screen-time and activity on each of the applications and usage of each application.
Each local computer terminal could be screenshotted based on customizable time intervals and images could be saved or scanned for content. Files stored in local computer terminal could be scanned for content, copied to a remote server based on customizable time intervals.