Preloader
Pars Right data leakage prevention system

Pars Right data leakage prevention system

Features


Managing the process of production, processing, transfer and destruction of digital assets of the organization


Access control to resources based on user rights, organization conditions and codified rules


Granting data ownership to the organization instead of the user


Reducing the risks of theft of the organization's assets


Disclaiming responsibility for protecting organizational data from the user


High security against unauthorized access


Support for VDI, Thin Client, Domain, Workgroup


The possibility of customized development of capabilities according to the needs of each organization


Ease of implementation, transparent operation and non-interference in the current business of the organization and the user


Possibility of policy based on group, computer, user


Provide full support service

 


Management facilities


Registration of user violations against applied policies


Automatically preparing a list of software and hardware assets of the organization's computers and updating it


Generating and sending reports based on the Syslog protocol


Monitoring user activity on the network and internet


Monitoring the copying, deletion and transfer of user information


Monitor the printer and printed documents


User-level activity records


Records and duration of execution of each process

 


Security facilities
Document control
Encrypting the output of applications using the Data Protection function
Encryption of files on the computer based on their type
Automatic encryption and decryption of files by defining a predetermined path (Hot Folder/Cold Folder)
Support for native/non-native encryption algorithms with different key lengths
Clipboard control and preventing the operation of video recording and screen capture tools
Hardware control
Control of physical and virtual hardware ports
Preparing a black and white list of authorized and unauthorized hardware to connect to the computer
Automatically inventory and update computers' hardware assets
Registration of the list of operating systems and their specifications
Printer control
User access control to the printer
Ability to track printed documents using Watermark
Network and Internet control
Definition of black and white list for Internet addresses
Reporting of viewed web addresses
The possibility of applying different filters on the characteristics of network packets
System monitoring
Preparing a report from the list of software and services available in the system and their changes
Preparing a report from the list of drivers and its changes
Preparation of reports on operating system updates and their changes