ADVANCED INFORMATION

TECHNOLOGY SOLUTIONS _____

 

 

Home         Products         Methodologies         FREE Quote         Site Map          Advanced Search          Contact .

 

 Strategic Outsourcing             Scientific Solutions              Business Applications           Software Tools .

 

 Talk to a representative > .

AllTrans
Banking, Finance & Accounting
Energy
Healthcare Solutions
Mobile Phone Software
Stock Quotes for PocketPC
Security Solutions
Government
ERP Packages
Logistics
eBiz Solutions
Manufacturing
eLearning
Multimedia Solutions

In this section:

UP
Hide IP - Surf Anonymously
KasperskyLab® - Anti-Virus
Patrol
Hidden Eye
Information Protection
SafeLogin
Safe Message
Safe Work
Fingerprint Information System
Crypto Identity
Magic Secure
S4 Enterprise
Smartkey Plus +
Smartcard Pocket Reader
Web Identity
Free Spyware Scan

In this sub-section:

UP


Sample
User Interface Designs
 GUI's >>

Testimonial Laurent Favre, CEO


"We have been working with [ITC Software] for more than 2 years now. We started with contract basis work and finally came to ODC which is completely dedicated for our tasks. High team stability, good proficiency and efficient administration support are the factors which bring high value to our collaboration."  ..../more

Hedge Funds Optimizer >>

Climate Change >

> Decision Theory

 
 

Security Solutions  back | UP | next

 


The S4 key provides desktop protection, encryption and access control software.

S4Enterprise enables system administrators to strengthen security/use rules. It offers:

  • - Extremely easy development and management.
  • - Centralized choice of User Profiles.
  • - Automatic management of portable computers.
  • - Modular construction.

Key Features of S4Enterprise

  • Application protection: Prevent users from running any application.
  • Drive protection: Restrictions include no access; read only access, no application to run from drive.
  • Folder protection: Restrictions include no access, read only access, hidden, encrypted.
  • File protection: Restrictions include no access, read only access, hidden, encrypted.
  • Encryption: Completely transparent - no manual encryption / decryption required. Encryption /decryption is performed automatically, in memory, during read/write operations.
  • Exemptions: Applications, files and folders can be exempt from general protection settings.
  • Registry key protection: Write protect Registry settings.
  • MS-DOS Command protection: Disable individual MS-DOS commands such as DEL, COPY, etc.
  • Multiple users: Individual and groups of users each with individual access rights to protected items.
  • One-time passwords: enabling one-day access if a password is lost.
  • Central Administration: Choice of methods for centralized administration on a network.
  • Roaming Access Rights: A user's access rights are applied wherever they are logged on.
  • Easy installation: Rollout across network with pre-set settings.
  • SynFolders - automatic creation of private encrypted folders for each on logged on user.
  • Multiple administrators, each with different access rights to settings.
  • Set-up Wizard to generate restrictions and access rights automatically.
  • Automatic generation of policy templates for control of through policy extensions; Windows 98 specific settings.
  • Automatic checking of settings for overlap and discrepancies.
  • Encryption options include ability to generate self-decrypting files, to allow send-ing of confidential files by email, etc. and use of encrypted floppy drives.
  • Available in versions for Windows 3.x, 95/98 and Windows NT.

  Request a Quote 

ISO 9001:2000 certifiedHome    Site Map    About us      Meet the Team   FREE Quote    Legal    Investors   Contact

© 2002-2015  ITC Software. All rights reserved. Sponsor of Modalart Shipping Containers

Product and company names mentioned herein may be trademarks of their respective owners. info(at)itcsoftware.com
Follow itcsoftwarecom on Twitter  

vBulletin statistic
    


Recommend this page::