Network information security monitoring and protecting software

Share on (11563864):


Price:

Quantity:


Product Overview

Description


    AJ-2000 Information network security monitoring and protecting system is a combined hardware and software unit which provides comprehensive security monitoring for personal or small business company online activities including web browsing, online search, emails, and social networks, provide a comprehensive plug and play system eaiser to clients. Monitor, capture, record and block your selection of intranet online activities based on keyword matching to protect information,

Personal or Small businesses:
   Small businesses especially those involved in finance, medical , software, information property such as accountants, investment agents, and loan agents, R&D centre can use it to protect their confidential data.
  Health care providers such as physicians, beauty salon or dentists can protect private patients health data.
 Service businesses including insurance agents, real estate agents, law firm, attorneys, and schools can protect confidential clients data.

 Major Features

Family Control software Protects your kids from unsecure online activities and dangerous behaviors in their daily life.

Enterprise Control protects your confidential information from unsecure online activities to avoid potential data leakage and damage.

1,Cross Internet monitoring

2,Monitoring chat content

3,Accurately record browsing web addresses and headlines 

4,Hardware asset management, recording computer hardware information and change records.

5,Check and view the installed software.

6,Remote shutdown, remote shutdown of the controlled computer

7,File operation monitoring, monitoring the operation of controlled computer files.

8,Screen interception, intelligent screenshots, timing screenshots

9,Disable USB storage device, disable U disk, Usb mobile hard disk and CD driver.

10,Disable USB network card and portable WiFi

11,Monitor the computer screen 

12,View / end the software to view / end the software running on the managed computer

13,Prohibit software operation 

14,Send a message to send the pop-up information to the managed computer.

15,Monitoring chat content

16,Prohibit modifying the network card IP and MAC (NIC address).

17,Six deployment modes: APP Super Gateway, ARP Gateway, Bridge Mode, Pure Plug-in Mode, Single NIC Gateway, Double NIC Gateway

18,Management open ARP firewall computer

19,Cross network segment (VLAN) management to support VLAN multi network segment management

20,Monitoring websites, prohibiting and monitoring access to nameed web pages, website URL classification filtering

21,Browse the page list filtering, you can access only the white list of sites, prohibit access to the blacklist of sites

22,Blocking chat software, other chat software

23,Blocking online games, and other online games

24,Blocked stock software, and other stock speculation software

25,Blocked all network video, and other network videos

26,Plugging all network TV, blocking network televisions

27,Plugging all Internet telephones

28,Plugging all network streaming media and plugging all streaming video with embedded web pages

29,Plugging all HTTP/FTP downloads and plugging all HTTP/FTP Downloads

30,Plugging all BT downloads to block all software downloaded using BT protocol

31,Plugging all the donkey downloads and plugging all software downloaded by eMule protocol

32,Blocking web mail, blocking etc.

33,Plugging client mail, plugging FoxMail, Outlook and other client mail

34,Blocking Internet proxy software

35,Intelligent allocation of Internet bandwidth, so that the rational use of bandwidth.

36,Internet bandwidth is precisely controlled to accurately control the download / upload bandwidth of a computer.

37,Internet traffic management limits the total flow of a computer to the Internet one day.

38,Download control accurately.

39,Preventing random changes of IP and MAC.

40,Computer attack alarm, alarm ARP attacks in LAN.

41,Policy time setting can set different strategies according to the time period.

42,Automatically discover the computer and start management.

43,Boot automatically run and start management 

44,Custom management rules, you can customize IP, and port plugging , Log query, log before querying

45,Forcing computer to break network 

46,Monitoring and records the online behavior of the managed computer.

47,Regular shutdown of the monitoring machine, and computer motherboard in conjunction with regular start-up before work automatic management, automatic shutdown after work disconnection

48,Integrated remote assistance, software integrated remote assistance, remote assistance to solve user's software usage problems

Hardware configuration:
Intel Core I5 processor
4GB DDR3 1600 memory
128GB mSATA SSD
1T- Ethernet Port
15" touch screen monitor
Metal computer standing base
Windows server operation
Solarcad information safety monitoring software for intranet use
If you want to add firewall to protect external attack please inquire 

 


0.2088 s.