Product Quick finder

Winkelwagen

  • Winkelwagen is leeg!

Informatie

Accel Computer Service
Mechelsesteenweg 25
B-2650 EDEGEM
BelgiŽ
tel. : +32 3 4603535
VAT : BE 0448.125.944
webshop@accel.be
curve_type_3_left_tcurve_type_3_right_t
Devicelock Networklock - Add-on License - 5 - 49 Endpoints - Renewal Maintenance And Support - English

Devicelock Networklock - Add-on License - 5 - 49 Endpoints - Renewal Maintenance And Support - English

 Zonder BTWBTW inbegrepen
Base Price:€3,07€3,72
Totaal:€3,07€3,72
Referentie: DLCAR1ENS71
Taal: UK
Laatste update:

Uitgebreide beschrijving

Inleiding

NetworkLock adds comprehensive context control capabilities over endpoint network communications. It supports port-independent network protocol and application detection and selective blocking, message and session reconstruction with file, data, and parameter extraction, as well as event logging and data shadowing. NetworkLock controls most popular network protocols and applications such as: plain and SSL-protected SMTP email communications (with messages and attachments controlled separately), communications between the Microsoft Outlook client and Microsoft Exchange Server (the MAPI protocol), IBM Notes, Web access and other HTTP-based applications including content inspection of encrypted HTTPS sessions (specifically, Web Mail, WhatsApp, and social networking applications like Gmail, Yahoo! Mail, Windows Live Mail, Facebook, Twitter, LiveJournal, etc.), instant messengers (Skype, Telegram, Viber, WhatsApp, ICQ Messenger, Jabber, IRC, Mail.ru Agent), cloud storages (Amazon S3, Dropbox, Box, Google Drive, Microsoft OneDrive, etc.), file transfers over FTP and FTP-SSL protocols, local network files transfers over SMB, as well as telnet and torrent sessions.

Features & Benefits


NetworkLock is represented in the user interface of DeviceLock Management Console, Service Settings Editor and DeviceLock Group Policy Manager by the Protocols node:

NetworkLock has the following key features and benefits:
  • Protocol access control. You can control which users or groups can gain access to the FTP, HTTP, IBM Notes, SMTP, MAPI (Microsoft Exchange), SMB, Telnet and Torrent protocols, instant messengers (Skype, Telegram, Viber, WhatsApp, ICQ Messenger, Jabber, IRC, Mail.ru Agent), cloud storages (Amazon S3, Dropbox, Box, Google Drive, Microsoft OneDrive, etc.), web search sites, career search web-sites, web-conferencing and webinars (Zoom.us), as well as webmail and social networking applications (AOL Mail, freenet.de, Gmail, GMX Mail, Hotmail (Outlook.com), Mail.ru, NAVER, Outlook Web App (OWA), Rambler Mail, T-online.de, Web.de, Yahoo! Mail, Yandex Mail, Zimbra; Facebook, Google+, Instagram, LinkedIn, LiveJournal, MeinVZ, Myspace, Odnoklassniki, Pinterest, StudiVZ, Tumblr, Twitter, Vkontakte, XING, Disqus, LiveInternet.ru) depending on the time of day and day of the week.
  • Protocols White List. Lets you selectively allow network communication over specified protocols regardless of existing protocol blocking settings. The white list is most effective in "least privilege" scenarios when you block all protocol traffic and then specifically authorize only what is required for employees to perform their daily job duties.
  • Content-Aware Rules (File Type Detection). You can selectively allow or deny access to specific types of files transmitted over the network. Recognition and identification of file types is based solely upon the content of files. This efficient and reliable algorithm allows for correct identification and handling of files regardless of the file extension. You can also use Content-Aware Rules to allow or deny the shadow copying of specific file types. 
Note: A ContentLock license is required to gain access to enhanced capabilities of the Content-Aware Rules feature.
Audit, shadowing and alerts. Provides the ability to track user activity for specified protocols, log a full copy of data/files transmitted over the network, and alert IS personnel to inappropriate user actions.
  • Audit, shadowing and alerts. Provides the ability to track user activity for specified protocols, log a full copy of data/files transmitted over the network, and alert IS personnel to inappropriate user actions.