The word "Protegent" is derived from a French word "Protégee", which means "To Protect".

PROTEGENT Enterprise Security Software

PROTEGENT
Please select at least one module you are interested in.

Data Leakage Prevention
Activity Reporter
Asset Tagging & Tracking

Description

Protegent Enterprise Security Software

Centralized control and coherent security management aptly define Protegent Business Security. It is a necessary PC protection and data security utility for corporations. With its central management console, administrator can manage all the clients inside a network, based on customizable security policies. The utility remotely controls software settings and deploys individual resources on clients. Detailed reporting of each client’s activities and centralized asset management are key highlights of the security suite.

Protegent Business Security Solutions Components:

Data Leakage Prevention

Data Leakage prevention module is an expeditious attribute of Protegent Enterprise Security, which makes this PC protection software an ideal professional suite for organizations concerned about the security of their confidential data. It takes care of information security and data protection needs of contemporary organizations, by blocking specific ports and other leakage points of their computers.

Activity Reporter

Activity Logger module is a superb network monitoring software, which provides enhanced PC security with benefits of key logger. It secretly tracks and logs every user activity on a computer, reporting all keystrokes made, applications opened and websites visited. Additionally, the computer monitoring module performs detailed time based reporting of various system activities.

Asset Tagging & Tracking

Asset tracking module tracks and reports the status of various hardware and software assets of a computer. The dedicated software performs perpetual monitoring of various hard disk parameters, such as hard disk temperature, and warns the PC user of any hard disk problem well in advance. Equipped with advanced disk cloning (ability to paste potentially fatal hard disk contents on a healthy disk) and disk scanning (showing bad sectors on hard disk) features, the tool functions as a smart tracking utility for securing enterprise resources.

System Requirements

Hardware & Software Required at Server

For Windows 2000

  • 1.66 MHz or higher processor
  • 512 MB of RAM Memory (1 GB recommended)
  • 900 MB available hard disk space (1 GB recommended)
  • Win 2000 (SP 4)
  • Internet Explorer 6.0 (or higher)
  • Microsoft Data Access Components 2.8 (MDAC)

 

Hardware & Software Required at Client

For Windows 2000

  • 1.66 MHz or higher processor
  • 512 MB of RAM Memory (1 GB recommended)
  • 30 MB available hard disk space (64 MB recommended)
  • Win 2000 (SP 4)

 

Features

Features of Protegent Business Security

  • Automatic installation of required Software’s i.e. Window Installer, SQL 2005, .Net Framework etc.
  • Centrally managed port access control and user control for workstations and servers.
  • Generates a database at first start up for storing the activity reports of the server and client machines under protection.
  • Auto enumeration of the entire network, showing the systems available.
  • Auto generation of port numbers for sending and receiving data between the server and client machines.
  • Maintain remote client’s user name, password and other details in credential manager.
  • Systems with Common Administrative user name and password can be saved as “everyone”.
  • Using export option administrator can save the credential list.
  • Import option to restore previously saved credential list.
  • Deployment on multiple clients can be done simultaneously.
  • Administrator can give Full privileges to power user.
  • Exclusive feature of giving warning to the administrator about the status of client machine in following ways:
  • If communication is broken between the client and server.
  • If deployed product is not working at client.
  • Settings-based centralized management.
  • If client is in active with server for a configured days.
  • Customization of reports according to administrator requirement.
  • Defining different policies for different users.
  • Backup and Restore option for policies (settings).
  • After installation, auto-start-up of the modules makes the software user friendly.
  • Easy installation with option of customizes installation.
  • Option for the Backup of settings, reporting, network structure and license for later use.
  • Restore option for the restoration of the earlier saved or backed-up data.
  • Backup option at the Console and at the time of un-installation.
  • Protection from unauthorized un-installation by asking for authorized password at time of un-installation.
  • Detailed reports of each client.
  • Option of IP ranges Deployment in the network.
  • Sets restrictions against all communication ports by blocking and unblocking them.
  • Prevent data theft as well as unauthorized access of critical data.
  • E-mail Notification to the administrator at desired time interval from server.
  • Credential manager feature to add client’s user name and password manually.
  • Alert Notification to the administrator as soon as any unauthorized action performed at client system.
  • Remote un-installation of the client machine software from the server.
  • Get daily report globally from anywhere on your mail id.
  • Centralized management ensured reduced administration workload and costs.
  • Ensures consistent protection across the organization through centralized management
  • Limits ports usage for client by applying schedule blocks.
  • Provides warning & immediate email notification information of client systems, which may require administrator’s attention.
  • Optimized for Business Environments.
  • Remotely manage the data prevention of multiple systems from a single location by blocking and unblocking ports.
  • Lock the Ports of Various Clients machines within LAN or Network.
  • Provides protection even when the client is disconnected from Network.
  • Set your admin password and client password separately.
  • Through package manual installation is possible (when deployment failed).

Feature list of Data Leakage Prevention

  • Proactive protection against data
  • Sets restrictions against all communication ports by blocking them.
  • Prevent data theft as well as unauthorized access of critical data
  • Solitary feature of White listing the authorized USB by using unique hardware ID of the device.
  • USB Read Only feature enables admin to make any USB mass storage devices read only whether it is Whitelisted or non Whitelisted.
  • Unique feature of File Transfer Log will show the reports of files transferred to and from a USB mass storage device.
  • File Transfer Log shows the detail reports of files added, removed and renamed to and from USB mass storage device.
  • E-mail Filtering log shows the complete report of filtered and blocked Emails of the MS Outlook client.
  • Admin/Users can block the ports like Flash Drive (i.e. USB, External HDD etc.) , CD/DVD, IEEE 1394 (i.e. Data Card), Blue tooth (i.e. Blue tooth dongle), Infrared, Printer (i.e. Network or LPT Port) Network Adapter etc.
  • Provide Real Time Monitoring
  • Run in hidden mode
  • Options to open single or multiple ports with authorized password when it is permanently locked.
  • Block ports when PC is idle.
  • Block ports in scheduled duration.
  • Block ports in multiple schedule duration.
  • Block ports to prevent unauthorized access
  • Options to open single or multiple ports with authorized password when it is Idle locked or Scheduled locked.
  • Special feature of Print Screen Locking
  • Setting of report log size (Min 1 MB to Max 5 MB).
  • Manage the logs by setting log days (Min 1 day to Max 90 days).
  • Option to save software settings so that they can be restored when needed.
  • Option to reset software settings to default.
  • Option of reporting system activities through e-mail or by FTP.
  • Option of reporting system activities through mail as scheduled (i.e. Daily, Weekly, and Monthly etc.) by user.
  • Option of sending Incremental Report or Complete Report as selected by user.

Feature list of Activity Reporter

  • Captures Application activity.
  • With the help of application monitor time log can be maintained for specific applications.
  • Unique feature of Blacklist and white list
    • Blacklist: Applications or website that are added will get captured and be visible in alert
    • White list: Won’t record any activity of the application or websites added in this list.
  • Captures clipboard contents.
  • Captures Internet activity.
  • Generate the logs of the websites visited.
  • Captures all keystrokes.
  • Option of showing system/non-printable keys is also available.
  • Take screenshots within the specified time interval or on every mouse click.
  • Option of different qualities of screenshot.
  • Option of capturing the desktop and capturing the foreground of the window.
  • Setting of report log size (Min 1 MB to Max 5 MB).
  • Manage the logs by setting log days (Min 1 day to Max 90 days).
  • Logging of working hours and idle time.
  • Option to select the level of tracking.
  • Send the reports to the specified email .(in the stealth mode)
  • Uploads all logs into the separate folders by FTP (in the stealth mode)
  • Sending of report logs in a specific time interval.
  • Password protected so only authorized personnel can access the reports.
  • Has an intuitive interface and very easy to use, even for beginners.
  • Runs in Absolutely invisible mode.
  • Self silent start up when system starts.
  • Remote Installation/Update/Uninstall.
  • Captures ICQ, Miranda, Skype, Google Talk, MSN, AIM, AOL, Yahoo, QIP chats.
  • Detection and notification of the custom keywords (alerts).
  • Records contents of password protected web pages, including Web Mail messages.
  • Monitors Windows Clipboard.
  • Monitors computer activity only when user goes online (optional).
  • Invisible in the Windows start-up list.
  • Monitors all users of the PC, even if you don't know their passwords.
  • Intercepts DOS-box and Java-chat keystrokes.
  • Tracks the activities in the safe mode too.
  • Reports of Application activity, Clipboard activity, working log, Internet activity, Keystrokes, Screen-shots all in HTML format.

Feature list of Asset Tagging & Tracking

  • Tags & Track Hardware Assets i.e. Motherboard, Memory, Mouse, Keyboard, Storage, Printer, Network, Processor etc. If any changes in hardware occur then auto message sending feature on server.
  • Tags & Track Software Assets i.e. operating system Info, Installed Programs. Auto message sending on server with respect to software changes
  • Real time hard drive status monitoring.
  • Avoid losing your important data due to hard drives overheating.
  • Hard drive health status information.
  • Amount of bad blocks or physical bad sectors on the hard drives.
  • S.M.A.R.T. attributes.
  • Disk scan option to check physical bad sectors.
  • Prompts emergency system shutdown in case of hard drive overheating.
  • Previewing raw values of S.M.A.R.T.
  • Alert if changes encountered in Hardware Assets & Software Assets.
  • Disk cloning feature.
  • Hard disk real time temperature with respect to time graph.
  • Email alert for S.M.A.R.T & Asset Tracking.
  • Schedule feature.
  • Reporting system reports through mail as scheduled (i.e. Daily, Weekly, and Monthly etc.) by user.
  • Reports of Software asset, Hardware asset, Temperature, Memory usages etc all in HTML format.

 

Press Releases

View All

April 2017 www.smechannels.com

Protegent’s Cool Summer Offer April 2017: BUY 4 GET 4 more...

April 2017 www.channeltimes.com

Unistal Launches Summer Scheme For Partners Selling Protegent more...

April 2017 www.openpr.com

Protegent’s Cool Summer Offer (04-03-2017 CET - IT) more...

April 2017 www.pressbox.co.uk

Protegent’s Cool Summer Offer (Mon Apr 03 2017) more...

Events

20th Nov at Delhi

Protegent Has Been Awarded as Best Data Security Product at SME Channel Meet on 20th Nov 2016 in Delhi. more...

2nd Oct at Allahabad

Unistal Has Sponsored Stek Partners Meet on 2nd Oct 2016 at Allahabad. more...

14th to 16th FEB at Indore

Unistal Has Participated at FONOCOM from 14th to 16th FEB. 2014 at Indore. more...

Customer Reviews

"When I bought my new laptop, getting an antivirus.more..."

Stephen Armitage

"What a software! Superb internet security! more... "

- Robert Symonds

Tie Ups



      
© 2017 Unistal Systems Pvt. Ltd. All right reserved.