• Control access of users to portable storage devices, mobile phones, SD cards, printers, scanners,...
  • Prevent the use of malicious portable storage devices and being infected by viruses, malware,...
  • Prevent exposure/loss of confidential data by monitoring users as they use portable storage devices for transferring data from/to your enterprise


Device Control

  • For Linux networks and off-line (stand-alone) Linux workstations
  • Immediately blocks new or already unauthorized devices upon insertion
  • Allows/blocks access to USB storage devices, SD cards, USB printers/scanners, CD/DVD drives and mobile phones based-on their unique properties: manufacturer, model, and serial number
  • Blocks currently used devices as soon as being unauthorized, even for busy devices
  • Makes blocked devices ready to use as soon as being authorized, without the need for reconnection

Audit System

  • Logs device insertions and all file transfer operations from/to storage devices

Management and Security

  • Centralized management of device access policies and log records via web console on the server
  • Secure communication channel between the server and workstations
 

Linux power and features attracts new users everyday. Many enterprises are doing their migration plans to Linux, and new plans are started every month. Maybe it's time for you to join the stream. We help you to enjoy the best of Linux by providing Linux software and products.

More

Securing an enterprise network is a sensitive task and must only be done by reliable security experts. We may help you by assessing vulnerabilities of your enterprise, then providing the most suitable security solution to protect your enterprise from attackers, viruses and other security threats.

More

Not all users and programs are authorized to access (confidential) enterprise data. We provide solutions to keep confidentiality of your data by controlling access of users to them, and audit user activities. Thus, the risk of expose and misuse of data by attackers and malicious users will be reduced significantly.

More

As your business grows, so does you data. Managing huge amount of  data is a subtle and often boring task that needs special skills and facilities. We provide solutions to help you categorize, store and retrieve data efficiently. We also develop products and tools to facilitate working with data.

More

If your computing and storage needs is constantly changing, if you do not have enough budget to buy computers and storage, if you want to access your data and work on your projects anytime from anywhere, even through a mobile phone, then probably our cloud-based services is your best choice.

More

Prevention of data loss and leakage is one of the main concerns of enterprises. Sensitive data must be protected while existing inside the corporation as well as when delivered outside and stored off-site. We provide data protection solutions to protect your data everywhere all the time.

More

Directory service is a requirement for management of resources and services available within enterprise networks. We may help you by providing a directory service  solution including user identification methods, a set of policies for controlling access of users to resources and services, auditing,...

More

Todays, workstations perform a large part of their tasks through communication with other systems over the network. Networking has it's own technical and security considerations. We provide Linux, as the dominant server OS, with network security solutions and a wide range of services to meet your needs.

More