The product features include the ability to target specific files,folders and extensions on user devices for encryption/decryption,retrieval and/or destruction regardless of device location.
But justas important is the ability to protect the data on the device byputting the device in a lock-down loop either remotely or through timeddelay.
All this can be done in an environment to completely satisfy auditrequirements. When a command has been remotely executed on a devicethe administrator receives a full report outlining when
the command wassent to the device, when the command was executed on the device, andwhat files and folders were affected by what actions. Once the commandhas been sent from server and received
by the device the user has nocontrol to prevent the command execution on the remote device.
The functionality for the BeyondEncryption Enterprise solution includes:
Product
The BeyondEncryption Enterprise solution is centrally deployed and configured from an administration console.
Delivery Time: | 10 days |
Supply Ability: | unlimited licenses |
Minimum Order Quantity: | 1 Set/Sets per license |
Payment Terms: | T/T,Moneybookers |
Port: | BKK |
Fob Price: | US$50-60BKK |
Compound Mode: | Integrated System |
Place of Origin: | Ireland |
Brand Name: | Beyond Encryption |
Type: | Management |
Type:Networking & Server Antivirus, anti-spam, and client firewall Protection for Windows, Macs and Exchange email servers Stops hackers and spam ...
Come From Afiintra Technologies Sdn. Bhd.
Compound Mode:Integrated System Place of Origin:Karnataka India Type:ERP Advanced Warehouse management system solution for manufacturing, distribution and retail enterprises and 3TPL provider. ...
Come From XAgeSolutions