View

Sorting

Products found: 1

logo
Offer a reference bonus
0.00

Interfocus LanScope Cat Features

Features: IT ASSET MANAGEMENT Your users buy new devices and apps, and access your network from anywhere, at anytime. Manage your IT before it gets out of control. LanScope Cat allows greater visibility into your assets and how users actually use them.
  • Access continual logging
  •  

  • Verify system updates and patches
  •  

  • Track license inventory and usage
  •  

  • Establish and enforce policies
  •  

  • Record printers and other peripheral devices
  •  

  • Identify permitted and forbidden apps
  •  

EMPLOYEE MONITORING User activity monitoring is complex, but LanScope Cat records “who” did “what” “when” on “which device” in one dashboard. If some operational violation that could be an information leak occurs, such as writing a customer list to a USB, a warning is displayed to the user, and the illicit operation is prevented. Monitor your onsite and remote workforce with LanScope Cat.
  • USB Usage
  •  

  • Print Usage
  •  

  • Website Access
  •  

  • File Activity
  •  

  • Email Usage
  •  

WEB ACCESS MONITORING LanScope Cat makes web access management easy. View who viewed particular sites and for how long. Block certain sites and get alerted to policy violations.
  • Know Who Views What. Record website visit history and webmail usage.
  •  

  • Control What They Can View. Block certain sites or determine which users can access specific sites and for how long.
  •  

  • Know When Policy Is Broken. Get notified and set rules around uploads, downloads, blocked keywords and/or URLS.
  •  

IT POLICY ENFORCEMENT IT devices can typically be hard to manage and secure—and cause a host of problems for IT managers! LanScope Cat is able to lower the overall security risk by providing a solution to the age-old problem; LanScope Cat protects devices, applications, and data, while delivering actionable insights into user behavior.
  • Control the Use of Devices. Control USB/CD/FD/SD memory and/or other devices including Wi-Fi/Bluetooth connections and identify files are being copied to and from storage devices.
  •  

  • Set User Permissions. Allow certain users to use specific devices and/or prohibit read/write operations.
  •  

  • Take Corrective Action. See what is happening throughout your network so you can take immediate corrective action if needed.
  •  

MALWARE PROTECTION
  • Detect. Gain centralized visibility into suspicious activity across all of a company’s endpoints to quickly analyze suspicious activity.
  •  

  • Investigate. Analyze malware’s digital footprint to fully understand and rapidly take corrective action to mitigate identified threats.
  •  

  • Prevent. Use event, alert, and log data to establish policies that record and prevent suspicious behavior.
  •  

... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
14
13

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.