shareapple.com
ShareApple Download -> Security & Privacy -> Covert Surveillance -> EagleEyeOS Professional

Editor's Pick
MP3 Audio Recorder - Record any sound and audio stream from PC or internet.
ZGZ Audio Editor - The Secret Weapon to Making Great Sound!
ZGZ Screen Recorder - Record your desktop or live streaming easily and quickly.

EagleEyeOS Professional

Click on the thumbnail to see the full image
Version:   2.0.3
Platform:   Windows2000,WinXP,Windows2003
Price:   67.00 USD [Buy Now]
Screenshot:   View Screenshot
License:   Shareware
Limitations:   30Days
Date:   2006-03-02
Size:   27.83
Rate:  
Publisher:   EagleEyeOS LLC.
Support:   support@eagleeyeos.com

EagleEyeOS Professional 2.0. FLT file lifecycle tracking against data leakage

File Lifecycle Tracking (FLT) Who did what and when did it with the file? Where and under what name can the file be found? FLT is a specially developed feature to trace what kind of operations happened with the file since its creation. This function marks the parallel life-tracks of the file with branches, it is also possible to search the files lifecycle directly from the queried Reports. Device handling Possibility to establish the access policy of a general purpose communication media. Such Devices can be Floppy-, CD-, DVD drives, Infrared, COM, LPT, USB, Bluetooth, Wireless ports, etc. The most important feature of it is to block the devices irrespectively of whether at the moment there is a Device connected to the host or not. Quarantine A special document area protection can be created, which provides the possibility to creat separate territories. Data movement can be controlled within this area, as well as beyond. It has the important ability to define approved users, applications, printers in the area, and specify the path to where the data can be exported to. It has the ability to separate the information from the Local and Domain Administrator, and the separation of the same application - running in the Quarantine and outside of it. Notebook handling - Running on the kernel level offers the possibility to keep the defined rules after losing the connection with the network, and to make them impossible to by-pass. It is possible to disable the Bluetooth devices, pen-drives on a notebook removed from the network. Furthermore it is an important property that the users processes will be logged locally together with the date and time of the disconnection and reconnection. At the next network connection to the Server, the rules and the logs will be synchronized. Printer - Printer rules can also be predefined. With their help, it can be determined which printers can be used or blocked on a certain host to maintain the control of the printed.

Copyright(c)2002-2024 ShareApple networks all right reserved!