Windows (Monitoring & Blocking)
Browser Activity
Monitoring browser activities i.e. access to Social Networking sites, Jobs & Career, Shopping portals, personal emails etc.
Monitor usage or time spent on different websites/URL like Social Networking sites, Jobs & Career, Shopping portals,
personal emails.
Blocking browser activities i.e. access to Social Networking sites, Jobs & Career, Shopping portals, personal emails etc.
Blocking sensitive browser form submissions based on content
Web Blocking Web Logging
Application Network Activity
Monitoring of applications and network activities i.e. download accelerators, Gaming applications, FTP, P2P applications
etc.
Selectively allow or block any kind of internet applications
Bypass network applications
Monitor usage or time spent on different applications like proxy & tunneling applications, download accelerators,
torrents, Gaming applications, FTP, P2P applications etc.
Application Monitoring Whitelisting Sandboxing
Email Activity
Monitor all SMTP based emails that are sent through email clients like Outlook, Thunderbird, Outlook express, etc.
Shadow logging of the entire content of the SMTP email along with attachments.
Control all SMTP based emails that are sent through email clients like Outlook, Thunderbird, Outlook express, etc.
Monitor all Gmail webmail activity along with complete shadow log of the outbound and draft emails.
Control all the outbound Gmail webmail-based email activity.
Control outbound OWA webmail-based file attachment activity.
Monitor SMTP Attachments Shadow Logging Gmail OWA
File Access Monitoring
Monitor file access logs by file extension type i.e. doc., docx., pdf., jpg etc.
File access monitoring report in csv format- agent wise & user wise
Monitor file upload activity, file sharing activity & file transfer activity.
Shadow logging of file access activity.
capability to monitor any file transfer activity performed during RDP session
Capability to add or modify list of applications for which file access activity needs to be monitored.
Shadow Logging Extension Specific Customize App Lists RDP
File Upload Activity
Monitor file uploads to any domain through browser i.e. file uploads to Dropbox, personal emails like yahoo etc.
Shadow log of files uploaded to any domain through browser i.e. file uploads to Dropbox, personal emails like yahoo etc.
Control file uploads completely by limiting them on the basis of the file types or the destination where they are being
uploaded etc.
Control file transfer over Skype and Windows Live Messenger
Track the destination server to which the files have been uploaded through browser.
Web Uploads Shadow Logging Extension Filtering Domain Filtering
Device Activity
Control removable storage device media usage
Access-based policies on each Registered USB device for different endpoints
Set specific policies on CD/DVD access. Blocking of MTP/Local and Network Printers
Blocking Bluetooth activity
Monitoring of all files being copied from computer to USB drive
Shadow log of files transferred from endpoint to external USB storage device using enforced encryption.
USB control and restriction based on file content
Internal access restriction on USB storage devices
USB Printer Bluetooth Shadow Logging
Search Engine Activity
Monitoring and logging of the web search engine activity
Content Filtering
Content filter-based alerts for email based on defined sensitive keywords, phrases, patterns (visa
card, Pan card, contact numbers, etc.) and file type
Content filter-based alerts for file upload based on defined sensitive keywords, phrases, patterns (visa
card, Pan card, contact numbers, etc.) and file type
Content filter-based blocking for email and file upload based on defined sensitive keywords, phrases,
patterns (visa card, Pan card, contact numbers, etc.) and file type Filtering
Email Attachment File Upload Printer
Strong Analytics & Incident Reporting
Graphical representation of activities via Ranking graphs and pie charts.
Augmentation of analytics section to show incident counts
Advanced Reporting and Analytics Framework for all kinds of device and network activities
Graphical representation of productivity of the users.
Analytics for top trending applications and websites being accessed in the organization
Real-time incident alert notification on dashboard
Near Real-time incident alert notification on Email
Detailed incident forensics report
Graphs Productivity Trends Email Alert Forensic Report
Administration Controls
Stealth mode to silently monitor activities
Audit Logs for admin activity
Admin activity Monitoring and Group Based Administration
Central management of agent version upgrades via server dashboard
Offline monitoring & controlling of end user activities
Temporary Policies for uplifting the user privileges for a defined duration
Active-directory based installation and user synchronisation
IP based user activity tracking
Restrict dashboard access based on IP addresses
Restriction on concurrent dashboard admin login.
Support for 2 factor authentication(2FA) to login into dashboard.
Password expiry for better protection
LDAP based admin authentication (Simple LDAP)
Other Valued Added Features
Print activity monitoring
Data at rest scanning for files stored on endpoint will act as audit tool in identifying sensitive documents
Customized reports download as per admin requirement
Password-protected uninstallation
Tamper Proof
Bulk installation on end user computers using Remote Deployment
Easy extraction of analytics and logs via PDF, CSV Reports feature where applicable
Capability to detect sensitive content in images using OCR
Custom block notification alert to user
Blocking of file copy to clipboard
Blocking of Print Screen functionality
Integration to third party SIEM consoles
Print Monitor SIEM Integration Data at Rest scan Tamper-Proof Image Analysis
Used cases covered by API Integration
API integration supported for productivity analytics
API integration supported for incident reporting
Linux (Blocking)
Browser Activity
• Monitoring browser activities i.e. access to Social Networking sites, Jobs & Career, Shopping portals, personal emails, etc.
• Monitor usage or time spent on different websites/URLs like Social Networking sites, Jobs & careers, Shopping portals, and
personal emails.
Application Network Activity
• Monitoring of applications and network activities i.e. download accelerators, Gaming applications, FTP, P2P applications,
etc.
• Monitor usage or time spent on different applications like proxy & tunneling applications, download accelerators,
torrents, Gaming applications, FTP, P2P applications, etc.
File Upload Activity
• Monitor file uploads to any domain through browser i.e. file uploads to Dropbox, personal emails like yahoo, etc. to
Dropbox, personal emails like yahoo, etc.
• Shadow log of files uploaded to any domain through browser i.e. file uploads to Dropbox, personal emails like yahoo, etc.
• Track the destination server to which the files have been uploaded through the browser.
Device Activity
• Control removable storage device media usage
• Access-based policies on each Registered USB device for different endpoints
• Monitoring of all files being copied from computer to USB drive
• Shadow log of files transferred from endpoint to external USB storage device using enforced encryption.
Email Activity
• Support for monitoring file attachments and SMTP emails via the Thunderbird application
• Support for monitoring file attachments and emails via G-Suit and O365 using a web browser.
Content Filtering
• Content filter-based alerts for file upload on the basis of defined sensitive keywords, phrases, patterns (visa card, Pan
card, contact numbers, etc), and file type
• Graphical representation of activities via Ranking graphs and pie charts.
Strong Analytics & Incident Reporting
• Augmentation of analytics section to show incident counts
• Advanced Reporting and Analytics Framework for all kinds of device and network activities
• Analytics for top trending applications and websites being accessed in the organization
• Real-time incident alert notification on the dashboard
• Detailed incident forensics report
Other Valued Added Features
• Periodic screenshot to monitor detailed employee activity.
• Print activity monitoring
• Audit Logs for admin activity
• Stealth mode to silently monitor activities
• Offline monitoring & Controlling of end-user activities
• Easy extraction of analytics and logs via PDF Reports Feature
• Role-based access management, to allow multiple administrators to access the administration console, with granular
control of privileges
• Admin activity Monitoring and Group-Based Administration
• Data at rest scanning for files stored on the endpoint will act as an audit tool in identifying sensitive documents •
• Restrict dashboard access based on IP addresses
• Easy extraction of analytics and logs via PDF Reports feature
• Admin activity Monitoring and Group Based Administration
MacOS (Blocking)
Browser Activity
Monitoring browser activities i.e., access to Social Networking sites, Jobs & Career, Shopping portals, personal emails, etc.
Application Network Activity
Monitoring of applications and network activities i.e., download accelerators, Gaming applications, FTP, P2P applications,
etc.
File Upload Activity
Monitor file uploads to any domain through browser i.e., file uploads to Dropbox, personal emails like yahoo, etc. to
Dropbox, personal emails like yahoo, etc.
Shadow log of files uploaded to any domain through browser i.e., file uploads to Dropbox, personal emails like yahoo, etc.
Device Activity
Control removable storage device media usage
Monitoring of all files being copied from computer to USB drive
Monitor all files being printed from the machine with content based alerts
Email Activity
Support for monitoring file attachments and SMTP emails via the Mozilla Thunderbird, Apple Mail application
Support for monitoring file attachments and emails via G-Suit and O365 using a web browser.
Content Filtering
Content filter-based alerts for file upload on the basis of defined sensitive keywords, phrases, patterns (visa card, Pan
card, contact numbers, etc), and file type
Graphical representation of activities via Ranking graphs and pie charts.
Strong Analytics & Incident Reporting
Augmentation of analytics section to show incident counts
Advanced Reporting and Analytics Framework for all kinds of device and network activities
Analytics for top trending applications and websites being accessed in the organization
Real-time incident alert notification on the dashboard
Detailed incident forensics report
Other Valued Added Features
Periodic screenshot to monitor detailed employee activity.
Audit Logs for admin activity
Stealth mode to silently monitor activities
Offline monitoring & controlling of end-user activities
Easy extraction of analytics and logs via PDF Reports Feature
Role-based access management, to allow multiple administrators to access the administration console, with granular
control of privileges
Admin activity Monitoring and Group-Based Administration
Data at rest scanning for files stored on the endpoint will act as an audit tool in identifying sensitive documents
Restrict dashboard access based on IP addresses
Easy extraction of analytics and logs via PDF Reports feature
Admin activity Monitoring and Group Based Administration