Protegent Enterprise Security Comparison Chart
Get 60% more features with Protegent Enterprise Security
Features |
Protegent Enterprise Security |
GFI Endpoint Security |
Websense |
Multiple systems deployment |
|||
Auto detect Network | |||
Settings and reports backup | |||
Alerts and warning on unautorized actions | |||
Cutomizable reports of groups, users, modules, etc | |||
Tamper proff agent | |||
Prevent data theft | |||
Scheduled port blocking | |||
USB Whitelisting | |||
Block USB Ports | |||
Block Infrared | |||
Block Bluetooth | |||
Block IEEE | |||
Block Ports when idel | |||
Block Network Adapters | |||
Block CD/DVD Rw | |||
Block Printers | |||
USB read only | |||
File transfer Logs | |||
Stealth mode operations | |||
E-mail filtering | |||
Print screen blocking | |||
E-mail reporting | |||
Applictaion usage logs | |||
Websites usage logs | |||
Blacklist websites | |||
Blacklist apllications | |||
Working/idle time logs | |||
Monitor keylogger | |||
Invisible in the window startup list | |||
Reports monitor application activity | |||
Reports/ Monitor Clipboard activity | |||
Reports/ Monitor internet activity | |||
working logs | |||
Monitor keystrokes | |||
Monitor Screenshots | |||
Track Hardware Assets | |||
Track Software assets | |||
Real time hard drive status monitoring | |||
scan and sectors | |||
Prompts emergency system shutdown in case of hard drive overheating | |||
Monitor S.M.A.R.T parameters | |||
Alert if changes encountered in hardware Assets & Software Assets | |||
Disk Cloning feature to maintain Business continuity | |||
Website history log | |||
Notifications | |||
Centerlized deployment | |||
Centralized Management | |||
Password Protection | |||
Telephone Support | |||
Email Support | |||
Online chat |