Security.Desk

Facts

Keep the device list in Security.Desk up to date

  • discover devices via domain list
  • discover devices via IP range
  • discover devices via Active Directory

Add devices from the respective discovery lists simply by clicking.

External interfaces under control

  • Storage devices (USB, memory cards, flash memory, e.g.)
  • Smartphones
  • Tablets
  • Digital cameras
  • CD/DVD
  • WLAN
  • Bluetooth
  • Modems and UMTS devices
  • LPT Port, COM Port

Grant rights per interface type

  • Full access
  • Read only access (not available with every interface)
  • No Access
  • File recording

Record file based actions

  • when files got copied to and from storage devices
  • when file got deleted on storage devices
  • when files got renamed on storage devices

Control of terminal server sessions

  • File transfers from and to local drives of thin clients in remote sessions of Terminal servers or Citrix servers are controlled as well (Additional module Terminal Server).

Grant rights at different levels

  • General (all users)
  • Single user
  • Organizational unit
  • Group
  • Computer

Further Options

  • White list: despite prohibition, the use of single devices or device series can be allowed. In addition, the entry of a specific release period is possible (specific time interval (from / to) or release from or until a certain point in time).
  • Black list for files types: they prevent users from copying files of certain types (e.g. exe files) to or from storage devices. As Security.Desk controls the characteristic signatures of the files transferred, it gets blocked even if it is renamed.
  • Black list for software: By adding software applications to this black list, you can prevent the users from starting those unwanted software on the clients (e.g. burning software, games).
  • Temporary approval: You can grant temporary access to interfaces to mobile users via code, even if the notebook is not connected to the network.

Components

  • FCS Security Service: This is the security service on the target devices
  • FCS Security Import Service: This application normally runs on the device where the Security Manager is installed. The service processes all incoming messages delivered by the Security Services on the clients. The Import Service uploads these data into the Security.Desk database.
  • Security.Desk Manager: This is the central management console for rights definition, interface control and reporting.

Supported operating systems:

  • Windows Server 2003, Windows Server 2008, Windows Server 2012 / R2, Windows Server 2016
  • Windows XP, Windows Vista, Windows 7, Windows 8, Windows 10
    Jeweils 32 und 64 Bit
  • Windows Terminal Server, Windows Server 2016 RDS
    (required module: Terminal Server)
  • Citrix MetaFrame, Citrix XenApp 6.x, 7.x
    (required module: Terminal Server)

Technical basis:

  • Leading Microsoft .NET technology

Supported data base systems:

  • Microsoft SQL Server Express (2005 and higher), Oracle 10/11

Supported languages:

  • German
  • English

Start typing and press Enter to search