Beruflich Dokumente
Kultur Dokumente
BEGINS WITH
SECURITY
WHAT WE DO
Interfocus provides vital productivity management
capabilities for small and mid-sized businesses.
Our multifunctional product delivers operational
visibility into the following:
IT asset management
Employee productivity
CONTROL
Manage with greater understanding and dexterity. Oversee web access using
white and black lists and/or URLs. Block unauthorized or custom applications.
Assign appropriate access privileges and monitor for their risk potential.
COMPLIANCE
Rules arent rules if they arent being followed. Understand who is complying
with the use policy and take steps to steer behavior. Be audit-ready with software
license management and tracking. Increase your awareness of unauthorized apps
on company devices and ensure mandatory apps are installed.
UP TO
80%
$500K
71%
compliance violations ++
small businesses*
30-40%
60%
96%
60%
of small businesses close within six
months of experiencing a data breach*
HEALTHCARE
FINANCIAL SERVICES
RETAIL
MANUFACTURING
LEGAL
GREATER VISIBILITY
Using a simple web browser UI, administrators can see on which PC a rule violation has occurred just by
clicking. Once a policy has been set, violations are displayed in the calendar and trigger an email notification
to the appropriate administrator informing them which PC is out of compliance.
Administrators have access to comprehensive logs of user activity so they can track policy violations
during office hours. Violations are set by company policy and can flag a wide range of unauthorized
actions by users, including playing games or shopping on company time or even exposing confidential
customer information.
By automatically detecting the devices attached to the office network and collecting their configuration
information, you can identify all the IT assets that need to be managed as well as any rogue assets on the
network. In addition, administrators can detect employees personal PCs when connected to the office
environment. This can give you better visibility toward protecting your network from threats, infections, and
malicious activities.
6
UNPRECEDENTED CONTROL
By reading the activity log 15 minutes before and after an incident, you can trace file operations
(copy, move, create, delete, or rename) from inception to the final destination. If a wider time frame
is required (than 15 minutes before and after), that can be checked in a single click.
SIMPLIFIED COMPLIANCE
Hardware and software information collection occurs automatically every day allowing administrators
to maintain an optimum inventory without the need for additional management action. IT asset
information can then be presented clearly, to reflect the true, current environment with all updates
recorded and sent to specified administrators via email.
CAPABILITIES AT A GLANCE
FUNCTION
DETAILED FUNCTION
OVERVIEW
Alert Management
Reporting
Shows summarized log and graph that drills down by group and date.
Allows users to search and lookup logs up to 5 years back and can trace certain causes of a le breach.
Network
Detection
Detection/Notication
SNMP Device
Management
SNMP-compatible Device
Management/Live Monitoring
Remote Control
vPro/VNC
Automatically retrieves over 50 types of data, including computer names and IP addresses.
Manages printers and peripheral devices as asset management items.
Coordinates with license dictionaries to perform SAM, allowing users to maintain an inventory of
installed applications and upgrade/downgrade software as needed.
Automatically detects USB devices in use and lets users check how long devices have been idle.
Power-saving Management
Congures settings including power-on/o or standby. Enables remote operations via WakeOnLAN.
Distribution/Automatic
Installation
Application Operation
Renders application operations in numerical terms and helps users grasp who uses which
applications how often.
Application Blocking
Literacy Management
Displays terminal operating times and operating status conditions in a visual format to help
visualize business tasks. Allows users to extract operations performed during non-business hours
(early morning/late night operations) and check operation logs.
Retrieves printing logs including document name, PC, person, and printer.
Sets thresholds and assesses large-volume printing projects.
Monitors web activity to identify which users are accessing which websites and for how long.
Captures web mail and any uploads/downloads from the website.
Blocks unauthorized access to web sites, including uploading, downloading, and writing to them
via blocked keywords and/or URLs.
Controlling Use of
Storage Media
Web Console
Asset
Management
File Distribution
Application
Operation
Management
Operational
Process
Management
Print Log
Web
Access
Monitoring
Device Controls
INTERFOCUS IN ACTION
EMPOWER REMOTE WORKERS WHILE
ENSURING REGULATORY COMPLIANCE
A semiconductor manufacturer with 300+ workstations allows its employees to
use laptops at home for the sake of efficiency. However, regulations in its industry
requires all change logs of regulated files to be captured. By running Interfocus
agent on remote workers laptops, the administrators visibility into whats
happening is significantly improved. The activity logs can also be reviewed to
reduce the potential of data breach.
10