You are on page 1of 5

Feature Description

Keyboard input monitoring Interception of keystrokes (including functional keys)

Audit of operation in file system Control of all types of operations (reading, changing, etc.)

Control of files on local network and drives on user PC Capability to index contents of files on network resources
and local drives

Control of the clipboard

Support of cloud storages: Google Docs, OneDrive, Office


Control of cloud storages 365, DropBox, Evernotec, Cloud.mail.ru, Amazon S3,
iCloud, DropMeFiles, OwnCloud

SharePoint control
-Monitoring via integration
− Network transmission monitoring
− Monitoring transmission on agent

FTP control

Monitoring time spent in software

Monitoring time spent on websites As a minimum, support of the following browsers: Internet
Explorer, Mozilla Firefox, Google Chrome, Yandex Browser,
Opera (Presto), Opera (Chromium), Safari, Tor Browser,
Netscape Navigator, Amigo, Flock, Avant Browser,
Lunascape, Maxthon, SeaMonkey, K-Meleon, SlimBrowser

Control of printers
− Interception of data printed on local printers
− Interception of data printed on network printers
− Interception of data printed on virtual printers

Control of Internet
− Interception of POST queries
− Interception of GET queries

Control of monitors − Screenshots taking


− Video recording of user activity
− Connecting to user’s monitor in real time

Webcam control
− Snapshots taking
− Connecting to user’s webcam in real time

Control of microphone
− Recording with microphone
− Connecting to user’s microphone in real time

E-mail monitoring Interception over protocols: IMAP, MAPI, POP3, SMTP,


NNTP, Web Mail (mail.ru, gmail.com, tut.by, yandex.ru,
rambler.ru, outlook.com, office 365, ukr.net, yahoo.com,
qip.ru,)
Messengers control Interception over the protocols: ICQ, MMP (mail.ru agent),
XMPP (Jabber), MSN, Gadu-Gadu, Lync, Yahoo, HTTP IM
(vk.com, ok.ru, facebook.com, mamba.ru, my.mail.ru,
LinkedIn, Evernote, Google+, Yammer, Fotostrana)

Skype control Interception of calls, messages. Files, contact list, history,


SMS

Lync control Interception of calls, messages, files, contact list

Viber control Interception of calls, messages, files

Telegram control Interception of calls, messages, files

Whatsapp control Interception of messages

Telephony monitoring Interception of audio calls and text messages of SIP


telephony through GSM, A-Law, u-Law, G.722 standards

Control of devices Control of all popular types of media and devices:


1) Audit and/or Access restriction:
− USB HID devices (besides keyboard and mouse)
− Printers (USB)
− Bluetooth adapters (USB)
− Scanners (USB)
− All USB devices (besides concentrators)
− COM port
− LPT ports
− Bluetooth
− Printer
− IR ports
− Media devices
− HID devices (besides keyboard and mouse)
− Keyboard and mouse
− FireWire
− Smart cards
− PDA
− Tape devices
− Modems

− Wi-Fi
− USB storage devices
− CD/DVD-ROM
− Cameras/Scanners
− Floppy disks
− SCSI
− Portable Windows devices
− Local drives and folders

2) Audit + Access restriction + Shadow copying:


− USB storage devices
− CD/DVD-ROM
− Cameras/Scanners
− Floppy disks
− SCSI
− Portable Windows devices
3) Blocking by contents:
− USB storage devices
− CD/DVD-ROM
− Floppy disks
− SCSI
− Portable Windows devices

4) Shadow copying from media:


− USB storage device

5) Black and White lists by type, device, manufacturer,


serial number, user, computer
Control of processes Capability to block/allow software to a user

Control of access to disks and folders

Control of access to files

Control of network folders

Control of disks connected over RDP

Wi-Fi control

Monitoring information in databases

Data encryption Capability of forced encryption of data sent to external


media

Control of user PC status Audit of technical details from PC with agent:


− Installed software
− Hardware
− Active user
− Status of agent and PC
− Free space on disk
− Latest activity of agent
− Audit of task manager data

Control of cloud storages over ICAP Interception of the following services via web interface
(not using application!):
1. Interception of Google Docs
2. Interception of OneDrive (Microsoft)
3. Interception of Office 365 (Office Online)
4. Interception of DropBox
5. Interception of Evernote
6. Interception of Yandex.Disk
7. Interception of Cloud.mail.ru
8. Interception of SharePoint

Control of e-mail over ICAP Interception of the following protocols:


• • WebMail of:
• gmail.com
• tut.by
• outlook.com
• office 365
• yahoo.com
• Google Sync

Control of Internet over ICAP


− Interception of POST requests
− Interception of GET requests
− Capability to add a list of anonymizers.

Control of FTP over ICAP Interception of files sent over FTP

Control of messengers over ICAP Interception of the following protocols :


HTTPIM of :

Google+ ,

facebook.com

Keywords full-text search

keywords search with fixed word order, proximity search

Search by word lists

Search using full text as a query filtering by similarity


degree (search of texts and documents similar in meaning
or contents to a sample)

English stemming

English thesaurus

Search by formal signs of documents

Search for unrecognized documents (protected with


password or bad documents)

Queries of several conditions

Simple regular expressions

Complex regular expressions

Digital fingerprints of text data

Digital fingerprints of graphic data (official stamps

Digital fingerprints of other data (binary


Search for activity in a videorecording of user actions

Recognition of text in graphic files (OCR) and text search

Report on software installed on computers

Report on changes of software installed on computers

Reports on changes of computer hardware

Report on connected devices

User efficiency report

Report on late arrivals, early departures and absent


employees

Report on user efficiency

Timesheet report

Report on time spent on web sites

Report on time spent in software

Report on total activity

Report on late arrivals of employees

Detailed information on users

User relations chart (with violations and without violations


of security policies

Sending notifications on reports

You might also like