Pars Right data leakage prevention system
Features
Managing the process of production, processing, transfer and destruction of digital assets of the organization
Access control to resources based on user rights, organization conditions and codified rules
Granting data ownership to the organization instead of the user
Reducing the risks of theft of the organization's assets
Disclaiming responsibility for protecting organizational data from the user
High security against unauthorized access
Support for VDI, Thin Client, Domain, Workgroup
The possibility of customized development of capabilities according to the needs of each organization
Ease of implementation, transparent operation and non-interference in the current business of the organization and the user
Possibility of policy based on group, computer, user
Provide full support service
Management facilities
Registration of user violations against applied policies
Automatically preparing a list of software and hardware assets of the organization's computers and updating it
Generating and sending reports based on the Syslog protocol
Monitoring user activity on the network and internet
Monitoring the copying, deletion and transfer of user information
Monitor the printer and printed documents
User-level activity records
Records and duration of execution of each process
Security facilities
Document control
Encrypting the output of applications using the Data Protection function
Encryption of files on the computer based on their type
Automatic encryption and decryption of files by defining a predetermined path (Hot Folder/Cold Folder)
Support for native/non-native encryption algorithms with different key lengths
Clipboard control and preventing the operation of video recording and screen capture tools
Hardware control
Control of physical and virtual hardware ports
Preparing a black and white list of authorized and unauthorized hardware to connect to the computer
Automatically inventory and update computers' hardware assets
Registration of the list of operating systems and their specifications
Printer control
User access control to the printer
Ability to track printed documents using Watermark
Network and Internet control
Definition of black and white list for Internet addresses
Reporting of viewed web addresses
The possibility of applying different filters on the characteristics of network packets
System monitoring
Preparing a report from the list of software and services available in the system and their changes
Preparing a report from the list of drivers and its changes
Preparation of reports on operating system updates and their changes