inDefend Business – in Premise

inDefend Business – Data protection and Cyber Intelligence suite helps businesses and enterprises to achieve full control over all the organization computers by minimizing possibility of data theft across the enterprise network while maintaining relevant data access through device and network access control, simultaneously blocking all kinds of unauthorized removable media devices, websites, email attachments and file uploads.

InDefend business also provides an advanced analytics framework for tracking employee productivity and suspicious activities within the organization.

Please provide the following information so that, we can send you the download link and instructions.


Your Name (required)

Your Role(required)

Your Email (required)

Your Contact number (required for verification)

Name of your Company (required)

Website

Company Head Quarters Location

Total number of employees in your organization (required)

Number of office locations (required)

Preferred deployment model (required)

Do you need dedicated (commercial) support for installation and usage ?
 Yes No

Live Action >

Please provide the following information so that, we can send you the best pricing.


Your Name (required)

Your Role(required)

Your Email (required)

Your Contact number (required for verification)

Name of your Company (required)

Website

Company Head Quarters Location

Total number of employees in your organization (required)

Number of office locations (required)

Preferred deployment model (required)

Do you need dedicated (commercial) support for installation and usage ?
 Yes No

Features

  • Granular USB Storage Device access control
  • Set specific policies on each Registered USB device for each PC
  • Block all unauthorized/alien USB storage devices access
  • Set specific policies on CD/DVD access
  • Selectively allow or block access to any kind of internet application, website
  • Set policies to control outgoing emails attachments via SMTP clients and Gmail
  • Set policies to control file uploads via HTTP/HTTPS
  • Set policies to control file transfer over Skype and Live Messenger
  • Shadow log emails, email attachments and file uploads
  • Create Multiple Policy Templates to set groupwise policies
  • Centralized control and management
  • Create Customizable reports for devices and network activities
  • Silent monitoring of all storage devices and network access activities
  • Set Email alerts for any unauthorized device and network activities
  • Policy to Monitor and Control offline PCs
  • Tamper Proof and Password-protected uninstall

Benefits

  • Bring more business by ensuring secure customer data – extremely important for overseas clients
  • Control and reporting of email, web and USB device usage of employees against data breach
  • Track and control usage of personal emails against data breach
  • Increase productivity of employees by restricting access to un-productive websites like social networking, gaming and chat sites
  • Keep track of job searches, freelancing, espionage and critical information sharing by employees
  • Minimize chances of malware and spyware spreading inside the network
  • Increase availability of internet bandwidth by blocking video streaming, LAN gaming and other high internet intensive applications
  • Prevent compromise of sensitive data through accidental loss of USB Drives
  • Selectively allow internet data cards and employee owned devices
  • Maintain an international security standard on use of your business data