IP-guard

The Enterprise Endpoint Security Solution

Misuse of endpoint computers may reduce of employee productivity, interfere with network stability and endanger company sensitive information. IP-guard's 14 modules are the effective solution to resolve all problems endpoint computers may encounter and a cost effect way to gain control over endpoint computers within an enterprise

The Solution to Endpoint Security

When facing the ever changing threat for Information Security, corporates need an effective tool to build a secure and efficient network environment. IP-guard's accurate control, comprehensive logs and effective efficient audit will minimize corporate operation risks and create a safer network environment. IP-guard focuses on endpoint information security by monitor and control endpoint computer asset information, event logs and behavior. IP-guard provides high performance, reliable, automated and easy to use system that captures employee information leakage under any circumstances allow administrators to grasp and control the corporate environment.

Basic Management

Obtains basic information of every monitored computer on corporate networks

Application Management

Records users’ application activity and controls application usage

Website Management

Collects data about users’ online activity and restricts access to specified websites

Bandwidth Management

Measures and controls the amount and type of traffic on users’ computers to optimize network performance

Document Management

Monitors and backs up documents created and modified by users to prevent data loss and leakage

Print Management

Tracks all print jobs to prevent data leaks and resource abuse

Screen Monitoring

Captures real-time screenshots to provide objective proof and context around questionable behavior

Remote Maintenance

Allows instant file sharing and on-site services, greatly increasing efficiency and reducing operating cost

Device Management

Detects all the devices connected to the computers on corporate networks and blocks any device at any time

Network Management

Stops external computers from connecting to internal networks to strengthen LAN security

Email ManagementBasic Management

Keeps track of every email movement and places limitations on the size, number, and attachments of emails to stop data leakage

Instant Messaging Management

Saves conversation histories, introduces file transfer control via IM applications, and sends warning messages once detecting violations

Asset Management

Offers detailed IT asset information and helps manage all the software on corporate networks

Removable Storage Management

Removable Storage Management Regulates how employees transfer data to/from USB storage devices; prevents data leakage with strong encryption

Components OS Hardware Minimum Requirements
Database SQL Server 2005 SP1 / 2008 / 2008 R2 / 2012 / 2014 / 2016 / 2017
  • Processor: Pentium 4 Dual-Core
  • Memory: 4 GB
  • Free Disk Space: 120 GB
Server Windows Server 2003 SP1 / 2008 / 2008 R2 / 2012 / 2012 R2 / 2016
  • Processor: Pentium 4 Dual-Core
  • Memory: 4 GB
  • Free Disk Space: 120 GB
Console Windows XP / Vista / 7 / 8.x / 10 Windows Server 2003 / 2008 / 2008 R2 / 2012 / 2012 R2 / 2016
  • Processor: Pentium 4
  • Memory: 512 MB
  • Free Disk Space: 1 GB
Agent Windows XP / Vista / 7 / 8.x / 10 Windows Server 2003 / 2008 / 2008 R2 / 2012 / 2012 R2 / 2016 Mac OS (Please contact us for further details)
  • Processor: Pentium 4
  • Memory: 512 MB
  • Free Disk Space: 1 GB