A special version of TPSecure Teller is designed to protect jobs of employees frontoffice bank (tellers, cash). Using TPSecure Teller allows you to build an effective system of protection against external (malicious software, hackers) and internal threats (insiders, disgruntled employees) to ensure the integrity of the system and data protection.
Additional information is available with the trial version for free
Live and recorded demonstrations of SoftControl technology advantages will become available on filling the request form. A detailed version of TPSecure Teller Administrator Guide is included into trial version package and provides the insight on the level of customization you can achieve with no additional charge. Our technical English-speaking support team is available 24/7 if you require answers on specific questions regarding the product. The information you enter into request form will not be disclosed in any way and is only for internal use.
To get in contact with our specialists, fill the form and press the "Send request" button.
TPSecure Teller is an effective protection for workstations with installed specialized software (client ABS, ASR, etc.). TPSecure controls startup and application activity, that ensuring the integrity of software during operation and maintenance of the system in the last good state. Because of this, the decision is up to date and effective against all types of malware, hacker attacks and against the unwanted actions by safety applications.
The system user-defined rules of application activity, file system access, peripherals and network resources along with a monitoring and logging provide the ability to control and prevent malicious or careless actions of preventing change the settings and configuration of the system and providing data security. The ability to centrally manage and modularity of the system allows to reduce the costs of administration.
Block attempts by users to launch any unknown application, or only specified applications such as games or multimedia players. Updates are installed automatically
Access to peripheral devices
Granular settings control access to USB drives, CD/DVD devices with the ability to disable auto-configaration and exclusions (by device type, name, manufacturer, ID). In addition, it is possible to block all CD / DVD media except protected and set access rules for COM, LPT ports.
Monitoring and logging
All operations on access and copying of data, including copying on external devices, and data input from the keyboard, are traced and logged with possibility of obtaining notices on certain actions. Presence of the module of monitoring is hidden from the user.
Nobody, except the authorized administrators, can be connected, stop or remove the client application, even with the rights of the local administrator.
When setting application activity policies, access rules can be time-limited to allow for workstation maintenance.
Logging history of changes of certain application allows restoration of files changed by that application.
Maintaining the accounting of the e-mails sent by the employee
It’s possible to track of employee’s transfer of information outside. The name of the attached files is logged when sending email to MS Outlook 2003.
Remote display screen shot session
Remote screen shot session of user’s workstation display in real time as part of a forensic investigation.
Record keyboard input
Record all keyboard input for any application in order to track who, when and what data is entered.
Monitoring of use of external USB stores
Allows to know what files and when were copied by the employee on the USB device or what files and applications were opened from the USB store (operation of reading, record, removal of files).
Monitoring of the files sent to print
Allows to trace and log the facts of sending documents on the press by the employee.
Monitoring of the system register
Allows to trace the changes of the system register which are carried out by the employee or appendices (operations of reading, creation, removal, renaming, change of keys).
Shadow copy for changed files
Automatically saves original copies of changed or deleted files and system registry keys.
It provide the software and system preservation last right location. Blocks the launch of hidden applications; new application launches are blocked until the administrator is able to determine whether the application should be allowed to run.
Unknown or potentially dangerous applications TPSecure launch in asandbox so they cannot affect other processes or the system itself. This method allows malicious activity to be blocked before updated signature databases and vulnerability patches are available.
Application activity control
TPSecure controls how different applications are permitted to access files and folders, USB drives, registry keys, external devices, and network resources. User-driven rules can be created to control application activity.
Targeted software protection
Enables custom protection to be implemented for specific software in the following ways:
Application consistency control. Control over program code changes ensures that applications cannot be launched if the executable code has been modified.
Application executable code protection. Prevent executable modules from being modified by other applications.
Application data protection. Disable read/write access to application data files and registry keys for all other applications.
SysWatch is based on the unique, patent-pending V.I.P.O. (Valid Inside Permitted Operations) technology, which combines three levels of protection:
D.I.C. (Dynamic Integrity Control)
Protects all executable software on the system by detecting any unauthorized activation attempt and preventing the process from launching before damage can occur. Saves the system in “known-good” state.
D.S.E. (Dynamic Sandbox Execution)
Specially-designated user account for potentially vulnerable software provides system-level privilege controls to block dangerous software activity. Also protects the PC from software vulnerabilities.
D.R.C. (Dynamic Resource Control)
Controls how different applications can access files and folders, registry keys, external devices, and network resources.
Enterprise Suite’s modular architecture easily scales to meet the needs of growing businesses.
Integration with other security solutions
Enterprise Suite operates alongside and can be integrated with other security and network management tools, such as SIEM, IAM, network traffic security, encryption, and traditional anti-malware solutions.