..
Data Loss Protection
Strategy to ensure sensitive and critical information are securely protected
Data Rights Management
Systematic approach to control, protect and prevent unauthorized redistribution of digital media and data
..
..
SECURITY
..
..
Web/ Application Control
Comprehensive Application & Internet monitoring with defined URL Category and quota limit control
Network Access Control
Unify Endpoint Security Technology with user authentication & Network security enforcement
Next Generation Firewall
Deep-packet and Application-level inspection to provide total protection
..
..
..
..
MONITORING
Inventory & Monitoring
Auto discovery, Real-time monitoring supporting multi-platforms with flexi alerting suite to provide notification
Software Vulnerability
Automatic background installation for OS and software security patches update
IP Address Monitoring
Plan and manage IP Address used within a network; Track IP Assigned to what device at what time