LanScope Cat IT資產管理和資料丟失預防軟體
由日本 MOTEX Inc. 公司開發的 LanScope Cat 軟體功能強大，主要功能有 Asset Management 資產管理、Operations Log Management 日誌管理、Web Access Management 訪問管理，及 Device Control。
軟體可以綜合管理IT資產，自動收集 IT 設備內部重要信息，操作日誌管理 Web 訪問管理、設備控制、電子郵件管理、應用程式 ID 監察等主要功能，以及伺服器 Log 訪問日誌管理、文件伺服器容量管理、域名登錄，註銷管理等多個特色功能，針對已知和未知的惡意軟體防護，為企業內部資料洩漏施以對策方案，有效解決資訊安全問題。
軟體工具檢測惡意軟體，追蹤進入通路的隔離。有些不能完全防止惡意軟體的新物種繼續在傳統的反病毒措施成長，某些情況下，不知道感染。這是一個挑戰，即使知道有病毒感染，可能需要很長的時間來確定原因。LanScope Cat 軟體擁有IT網路管理和資料丟失預防工具的強大功能，提供企業防毒及資料洩漏和丟失預防的最佳解決方案。
The actual causes of information leaks are mostly employees or contractors who bring out data in e-mail or recording media or copies of paper materials. As described above, companies suffer great damage due to information leaks. These costs are not only in the form of apologizing to victims and investigation costs, but in the loss of trust in the company and brand image. The effect on a company of just one information leak is immeasurable. And 80% of them are caused from the inside.
- Manage IT assets
- Monitor asset performance
We automatically collect information to ascertain usage status of IT assets, including PCs and software, and create an environment to render the best performance by setting up the right resources in the right places.
- Employee monitoring
- Productivity management
By recording computer usage, we can suppress illicit and non-business use. Also, we learn about and analyze usage of IT assets and work status, creating improved operational efficiency and productivity.
- USB control, app control
- Control of data removal
By visualizing data usage and controlling routes through which information can leak (Web, devices, apps, PCs), we protect personal information and your company's secret information.
Update hardware and software information every day to maintain an accurate environment without the hassle of management tasks.
Automatically collect IT asset information and always see accurate information. Also, retain change histories and notify administrators by e-mail. It is possible to import an existing log or export the logs in each generation.
Operations Log Management
By managing PC operations logs, it is possible to improve security and find problems in emergencies, without reducing operational efficiency.
PC usage information, such as apps running, printing, file operations, screen views (window title) is recorded. If there is any operational violation, a warning is displayed to the user, promoting improved security and morality. Also, administrators are notified in real time, making it possible to prevent potential serious problems.
Web Access Management
Monitor web site use, and limit access to illicit sites.
It is possible keep a record of web sites accessed and control access to specific web sites or categories of web sites.
Promote use of appropriate web sites by users, and avoid access to harmful sites.
Control use of devices such as USBs and CDs, and prevent the leaking of important secret information.
Manage all company devices and limit their use. If a prohibited device is connected, the user is notified that it is prohibited and illicit use is controlled. Also, allow device use in limited situations through setting detailed conditions by PC and device to adapt to the workplace.
OS: Windows Server 2008/ Windows Server 2008 R2/ Windows Server 2012/
Windows Server 2012 R2
Memory: 4 GB or more
HDD free space: 150 GB or more
Database: SQL Server 2008 R2/ 2012
OS: Windows XP/ Vista/ 7/ 8/ 8.1
Windows Server 2003/ 2008/ 2008 R2/ 2012/ 2012 R2
CPU: 300MHz or more
Memory: 128 MB or more
HDD free space: 50 MB or more