|License:||Free to try|
|Op. System:||Windows2000, WinXP, Windows2003, Windows Vista Home Basic, Windows Vista Home Premium, Windows Vista|
|File size:||36.57 MB|
Publisher description for EagleEyeOS Professional
Powerful and flexible security solution against data leakage. The program provides full-scale protection, uniquely combines file lifecycle tracking with portable data stores and rights management for users and/or files. It allows you to track and enforce compliance with security policies and standards (ISO/IEC 27001:2005 (BS7799), CobIT, SOA), and provides real-time notification and post-event analysis of user activities and incidents. Supports logging and evaluating file level operations, as well as copy/paste/print actions. By creating reports, the program can not only search for and sort simple actions, but can also return exact results about actions taken on certain files, the user these actions were performed by, and the time of these actions; the results can show when, where and by whom an external data storage device was mounted, and what sort of operations were completed on it. Based on the specified settings, the program can evaluate incoming information in run-time, and can send a security alert of any operation to the security team. It supports creating isolated areas (or quarantines), which help secure confidential documents even against system administrators. It helps create a network-wide security zone, blocking the way from computers that have been added, or located outside the protected zone. Through the separation of user rights, it supports not only the segregation of operating and security tasks, but also the use of notebooks inside or outside the network; on supported operating systems, the program™s functions work on any type of file systems, applications, or hardware. The program helps prevent data loss, too. Due to their flexible structure and multilingual nature, the modules of EagleEyeOS Professional can be installed in any combinations within small organizations, as well as on wide networks of any size. It therefore provides a full-scale and comprehensive solution to network operators, security professionals, and organization managers.