USB Blocker Professional
USB Blocker Professional is a security software that prevents data theft, data loss and malware infections by blocking all untrusted USB devices. All unauthorized USB drives, external drives, network drives, non-system drives, CDs, DVDs, CDs, Blu-ray discs and memory sticks will be blocked unless you authorize them. The program maintains a list of authorized USB devices that are permitted to access your PC. You can authorize several USB devices at once. By default, USB Blocker Professional does not allow access to any unauthorized USB device unless you authorize it and must be an administrator.
USB Blocker Professional maintains a record of Authorized USB devices, invalid login attempt, device log, invalid password change, invalid device authorization and invalid apply changes to keep you informed of any suspicious activity while using the program. You can easily view reports anytime you have access to the program. You can export your report as a PDF, Text or CSV file.
Learn more
iSecurity SIEM / DAM Support
iSecurity helps companies protect valuable information assets against insider threats, unauthorized external access and malicious, or inadvertent, changes to field-level data in business-critical applications by sending real-time alerts to specific recipients. Real-time Syslog alerts sent from all iSecurity modules are fully integrated with leading SIEM/DAM products such as IBM’s Tivoli, McAfee, RSA enVision, Q1Labs, GFI Solutions and have been tested with products such as ArcSight, HPOpenView, CA UniCenter and others. iSecurity supports Imperva SecureSphere DAM. Integration with SIEM products for forensic analysis of security-related events is an increasingly important requirement at companies worldwide; indeed, Raz-Lee’s iSecurity suite has supported Syslog-to-SIEM for numerous years. Proven integration with all SIEM products. Field-mode support for the 2 major standards – LEEF (IBM QRadar) and CEF (ArcSight). These standards are supported in many other SIEM products as well.
Learn more
iSecurity AP-Journal
iSecurity AP-Journal protects business-critical information from insider threats and from external security breaches, and notifies managers of any changes to information assets and streamlines IBM i journaling procedures. iSecurity AP-Journal logs the who, what, when and which of activities. It logs database access (READ operations) directly into the journal receivers, which is not provided by IBM i journaling and is an important component of compliance. Monitors changes to objects, application files and members. Supports periodic file structure changes to application files. Enables monitoring application files across changes to file structures. Programmable field-specific exit routines. Real-time alerts indicating changes in business-critical data; these application alerts are activated by user-defined thresholds. Comprehensive reports displaying all application changes on a single timeline in various formats.
Learn more
ArcTitan
ArcTitan is an email archiving and email data protection (EDP) solution allowing users to securely archive emails and simply retrieve them. ArcTitan is compliant, fast, secure, and M365 friendly.
You can Save up to 75% of email storage space and costs with lightning fast search and retrieval. Significantly enhances Microsoft 365 email Search and Storage functionality with cost and time savings.
With ArcTitan, our Cloud-Based Archiving Solution, users can fully offload their email storage requirements to the cloud. Email Archiving provides businesses with unlimited archiving of both inbound and outbound mail, as well as attachments, folders, calendar entries and contacts.
The main features of our business email archiving solution include lightning fast search and retrieval, ultimate scalability, and full compliance with GDPR, eDiscovery, Sarbanes–Oxley, HIPAA, and other legislation for e-discovery, retention and audit.
Book a demo today.
Learn more