Platform:Windows2000,WinXP,Windows2003,Windows Vista Home Basic,Windows Vista Home Premium,Windows Vista Business,Windows Vista Enterprise,Windows Vista Ultimate
Powerful and flexible security solution against data leakage. The program provides full-scale protection; it uniquely combines file lifecycle tracking with portable data stores and rights management for files.
Powerful and flexible security solution against data leakage. The program provides full-scale protection, uniquely combines file lifecycle tracking with portable data stores and rights management for users and/or files. It allows you to track and enforce compliance with security policies and standards (ISO/IEC 27001:2005 (BS7799), CobIT, SOA), and provides real-time notification and post-event analysis of user activities and incidents. Supports logging and evaluating file level operations, as well as copy/paste/print actions. By creating reports, the program can not only search for and sort simple actions, but can also return exact results about actions taken on certain files, the user these actions were performed by, and the time of these actions; the results can show when, where and by whom an external data storage device was mounted, and what sort of operations were completed on it. Based on the specified settings, the program can evaluate incoming information in run-time, and can send a security alert of any operation to the security team. It supports creating isolated areas (or quarantines), which help secure confidential documents even against system administrators. It helps create a network-wide security zone, blocking the way from computers that have been added, or located outside the protected zone. Through the separation of user rights, it supports not only the segregation of operating and security tasks, but also the use of notebooks inside or outside the network; on supported operating systems, the program?s functions work on any type of file systems, applications, or hardware. The program helps prevent data loss, too. Due to their flexible structure and multilingual nature, the modules of EagleEyeOS Professional can be installed in any combinations within small organizations, as well as on wide networks of any size. It therefore provides a full-scale and comprehensive solution to network operators, security professionals, and organization managers.
Whats new in version 3.1.0: New features of EagleEyeOS? Professional v3.1: Advanced Teamwork, NetBIOS hostname, and IP address. For further information - please, visit EagleEyeOS? Professional Change Log and Online Help. Requirements: .NET Framework 1.1 SP1 Operating system: Windows2000,WinXP,Windows2003,Windows Vista Home Basic,Windows Vista Home Premium,Windows Vista Business,Windows Vista Enterprise,Windows Vista Ultimate Release notes: Minor Update
Observes the files which are placed on your computer at the time of the software installations, downloads, Internet connections... or other events!
Price: $24.90, Rating: 9.33, Downloads: 134 Download
Handy Keylogger - superior stealth computer monitoring software for family and business use! With Handy Keylogger you can: record keyboard keystrokes, passwords, capture desktop activity, monitor internet usage, log chats and emails!
Price: $39.00, Rating: 9, Downloads: 114 Download
Freeware Smart Phone forensic utility examines mobile phonebook detailed information like text messages, contact name and numbers, operating system registry, installed applications, display file name and generates report in TEXT or HTML file format.
Price: $79, Rating: 8, Downloads: 107 Download
SystemSleuth is a computer surveillance program that secretly monitors all activity on your computer. View emails, passwords, instant messages, webcam images, printer activity, visited websites, microphone sounds, keyboard activity, and much more.
Price: $29.95, Rating: 10, Downloads: 94 Download
User Rating
Rating:2.2 out of
5 Based on13 ratings.
13 user reviews.