Developers: | Atom Security, before AtomPark Software (Atom Security) |
Last Release Date: | August, 2012 |
Technology: | Cybersecurity - Information loss preventions |
Content |
The program performs monitoring of working computers in network of the organization in real time and also collects statistics about activity of users (the started programs and applications used Internet resources and the visited sites, communication in the Internet messengers and social networks).
The possibility of blocking of any action is also implemented: start of programs, visit of the websites, access to files, connection of USB devices and informing administrators on cases of violation of security policy by employees.
Security Curator 5.3
Software package for information security support of the enterprises and also optimization of working time of employees. The program supports functions of observation of computers in real time, collecting of statistics about activity of users behind working PCs, performs monitoring of the started programs and applications used Internet resources and the visited sites, communication in Internet messengers.
In the new version the following functionality is implemented: the system of accounting access rights — thanks to it appeared an opportunity to distribute access rights of system administrators to functionality of the software and also to limit access for some groups of the administrators to different data types who are brought together by agents of observation; monitoring and blocking of connection/shutdown of all types of USB drives and devices — employees will not be able to use USB devices in corporate network any more if it is forbidden by security policy, inclusion of this option will allow to prevent leaks of confidential information, it cannot just be downloaded; monitoring of a clipboard — a system saves all information which was brought by users in a clipboard (when copying, moving files, etc.).
According to AtomPark Software, in Security Curator of version 5.3 the editor of filters using whom there is filtering of collected information is optimized. Now settings became even more flexible. At the same time, the monitoring system of desktops (tracking what the user sees on the screen of the PC) is processed including for users of terminal servers. Also there was an opportunity to unload the saved screenshots from the program. Besides, high-speed performance of the database is improved and also stability of its work is increased.
Security Curator 5.4
- Accounting and control of connections to shares on network is implemented.
- The simplified creation of the prohibiting actions is implemented: blocking of programs and websites.
- The feature for shutdown of separate types of monitoring for the selected agents is added.
- The possibility of automatic update of agents on the user computers is implemented that considerably simplifies process of updating of a system.
- The step-by-step master of fast setup of a system much simplifying process of configuring of a product and its setup is created.
- The possibility of the centralized application monitoring exception is implemented.
- The feature for input of range of networks for adding of agents is added that considerably accelerates process of mass adding of agents.
- The possibility of fast grouping of agents in groups is implemented.
- The main dialog of the Panel of the Administrator is modified, access to the main program capabilities became more convenient.
Security Curator 5.5
"Practically in any organization control of personnel is required. It can be connected as with a low performance of employees, unwillingness to work, and with questions of confidentiality of information and its protection. The program provides full control of all actions of employees of computers. It is very large volume of information, our clients - the companies having up to several thousand computers, - Makarov Konstantin, the CEO of AtomPark Software company commented on a release of the new version. - We made the decision on implementation of the new database which allows to make work as stabler. Stability of a program runtime will remain even at considerable expansion of the park of computers".
In the new version of Security Curator the following functionality is implemented:
- Implementation of the new database that considerably increases stability of work of the software.
- The possibility of consolidation of several databases in one is developed.
- The interface of viewing data is improved.
- The master of creation of reports is processed and optimized for convenience of users.
Security Curator supports functions of monitoring of working computers in real time, collecting of statistics about activity of users for the PC (the started programs and applications used Internet resources and the visited sites, communication in the Internet messengers and social networks).
Also there is a possibility of blocking of any actions: start of programs, visit of the websites, access to files, connection of USB devices.
In case of violation of security policy by employees, administrators will receive the notification in a pop-up window on the screen of the monitor, or will be notified on the incident by email and the SMS.
Security Curator 5.6
Security Curator 5.6. exercises control of activity of employees, if necessary providing blocking of their actions: start of programs, visit of the websites, access to files, connection of USB devices and informing administrators on cases of violation of security policy by employees. In software there is also a possibility of monitoring of the computers connected to corporate network in real time — collecting of statistics about activity of users: the started programs and applications used Internet resources and the visited sites, communication in Internet messengers and social networks.
- monitoring of the encoded network traffic that allows to trace mail of employees which is transmitted on the encoded SSL channel and also visit of the websites through https connection;
- the optimized output of events from databases;
- possibility of the notification of the user and administrator when blocking actions of the user;
- sorting of the list of agents during creation and editing a report scheme;
- the utility for reduction of volume of the data warehouse.
Security Curator 5.7
In the new version of the program MySQL the database management system is implemented and also entry of all correspondence in Skype is added.
"The MySQL database management system well proved in work, having shown rather high rates of performance. For our clients it is great advantage as now Security Curator works at so popular and flexible solution. You should not forget that MySQL has the free version", - Konstantin Makarov, the CEO of AtomPark Software company commented on a release of the new version. "Support of monitoring of Skype also deserves attention, now more and more employees use this program for corporate correspondence, ICQ and other similar messengers begin to consign to the past".
The program supports functions of observation of computers in real time, collecting of statistics about activity of users, performs monitoring of the started programs, the visited sites, communication on social networks and Internet messengers. The possibility of blocking allows to limit access to the undesirable websites, programs and applications to a certain period or is permanent.
The software is simple in installation and management, and the technical support service in Russian, by phone and e-mail will help to cope with operational issues.
New opportunities:
- Implementation DBMS MySQL
- A possibility of logging of correspondence of Skype (without shadow copying - the sent files)
- an ozmozhnost of work of several gates with communication between them. Simultaneous operation with several databases that allows to distribute internal loading in network and on the database, in particular
- Optimization of an output of events from the database
- In the magazine the algorithm of loading of events is optimized, and the feature for selection of any text is added
- Display of the record "Activity of the Application" includes a preview of screenshots
- For records of Clipboard partial display for big contents is added
- In the report on activity of applications the number of hours is added
- Logging of the debug information
- Verifiability of port of updating and updating of the selected agents or groups of agents using the manager of updates
- Possibility of export and import of conditions of the filter
- Export of events to a PDF format