We understand the importance of data security and data theft prevention, that’s why experts at Unistal have designed complete security which features:
-Effective Antivirus Security
-Extreme protection against online cyber threats
-Proactive data recovery of lost/deleted data
-Prevention of unauthorized data leakage from different external sources
-Reporting and monitoring of user’s application and internet use
-Secured data encryption in case of laptop theft
-Enhances system performance
Protegent 360 is a complete package of 6 different modules:-
-Total Security
-Port Locker
-Locate Laptop with Data Encryption
-Activity Reporter & Monitoring
-SysBoost
-Crash Proof
FEATURES OF COMPLETE SECURITY : -
A. SYSBOOST OR SYSTEM TUNE UP FEATURES
1. File Wipe
2. Tune-Up
3. Registry Cleaner
4. Internet File Wipe
5. Disk Defragmenter
B. FEATURES OF PORT LOCKER
1. Block USB Port
2. Whitelisting of Authorized USB Devices
3. USB Read Only Feature - Option of assigning USB read only setting to white listed and non white listed USB Mass storage device.
4. File Transfer Logs To and From USB - File Transfer logs will show the reports of file transferred to and from USB device along with the reports of files added, removed, renamed and modified.
5. Block IEEE 1394
6. Block Network Adaptors
7. Block CD/DVD
8. Block/ Unblock as per schedule or block port when the system is idle - Multiple or single ports can be blocked automatically
9. Email Filtering
10. Block Bluetooth
11. Block/Unblock Single/ All Ports
C. FEATURES OF ACTIVITY REPORTER
1. Monitor Internet Activity - Captures all Internet activity with features of Blacklist and White list
- Blacklist-Internet activities (web sites) which are added in this list are monitored and be visible in alerts.
- Whitelist-Internet activities which are added in this list are ignored and not visible in alerts.
2. Monitor Application Activity - Captures all system application activity
- Blacklist-All the application activities that are added will get captured and be visible in alerts.
- Whitelist-All the application activities that are added in this list, are ignored and not visible in alerts.
3. User wise reporting
4. User login Reporting
5. Monitor Keystrokes - Capture all key strokes.
6. Monitor Screenshots - Capture the Screen shot within a specified time Interval or on every mouse click.
7. Monitor Chat Activity
8. Monitor Clipboard Activity - Monitor all the cut, copy, paste activities.
9. Monitor Working Log
D. FEATURES OF LAPTOP TRACKING AND DATA ENCRYPTION
1. Laptop/ User Tracking - Secure Webpage for every user to Keep (monitor) a close eye on movement of person with the designated laptop e.g. company employee
2. Tamper Proof Agent - Reports on server contain information on date, time, Public IP, Location, country, state, city, ISP, Longitude & Latitude. No human intervention for reports
3. Automated Data Encryption - Remotely launch the data encryption module on predefined sensitive files and folders. Encrypts Data even if laptop is not connected to Internet for particular period
F. FEATURES OF CRASH PROOF
1. Deleted File/Folder Recovery
2. Un-format Formatted Drive
3. Repair Corrupted/ Deleted Partition
4. Revive incase of FAT/MFT Corruption
Useful links -
Company Website -
Buy/Demo download -
0 Comments