EagleEyeOS One Free

EagleEyeOS - Real time monitoring, File Life Time Tracking (FLT), Device handling, Quarantine
Download

EagleEyeOS One Free Ranking & Summary

Advertisement

  • Rating:
  • License:
  • Freeware
  • Publisher Name:
  • EagleEyeOS LLC.
  • Operating Systems:
  • Windows 2K / XP / 2003 / Vista
  • File Size:
  • 6.8 MB

EagleEyeOS One Free Tags


EagleEyeOS One Free Description

EagleEyeOS One Free suits everybody who do not require the extensive network systems that is typical of the enterprise segment, but they want to determine an access policy to handle the mobile devices (Floppy, DVD, COM, Bluetooth, CD, LPT, USB, InfraRed, Wireless, etc.) in order to protect the data and the proprietary interests. On the computer the mobile devices that could be in use to expropriate the information can be blocked or rather, the activities executed on them can be traced. EagleEyeOS One Free sends alerts to a predefined e-mail address about the connected and unplugged storages, additionally the file operations executed on the storages. Available language versions: English and Hungarian. Kernel The software's rule enforcement technology works in the kernel of the operating system, between the levels of the access control and the file system. It enables protection processes that cannot be found anywhere else. Application independence It monitors and controls the processes at kernel level, so it is completely independent from applications running at user levels. File system and hardware independence It builds in the kernel above the file system; therefore, it is completely independent from file system drivers and the physical discs under the drivers. Support of the non-Microsoft based file It supports Novell Netware sharing equal to Microsoft Windows sharing, providing all logging protection features on both platforms. The technology can be used without restrictions on both Microsoft Netware Client or Novell Netware Client. Reproduction independence Copy recognition is independent from the initiating application. E.g. Explorer, Drag and Drop, Copy and Paste, Print Screen, Command Prompt. Own protective line It builds an additional protection line in the kernel under the level of access control. It can block document from the Local and/or the Domain Administrator. Furthermore it opens up the possibility to create separate document territories (Quarantines) securely. Devices (availability independence) Communication channels can be controlled irrespective of their actual availability. We can block e.g. the Bluetooth communication on a certain host even if the host is not connected to a Bluetooth device at that moment. The Bluetooth device connected later on will not be able to operate. Storages (producer and type independence) Beyond the communication channels, there is a possibility to recognize and control storages connected to the computer in runtime. This makes the management of devices, independent of producer and type (e.g. Pen-Drive, camera, etc.), possible. A major feature is that events made on storages, will be logged; also it is possible to use the Read-Only rule. Notebook handling Running on kernel level offers the possibility to keep the defined rules after losing network connection, and to make these rules impossible to by-pass. It is possible to disable the Bluetooth devices and pen-drives on a notebook removed from the network. Furthermore, user activities will be logged locally together with the date and time of the disconnection and reconnection.


EagleEyeOS One Free Related Software