SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
ApplicationPro
ApplicationPro stops the execution of unauthorized applications

The uncontrolled use of applications is a growing problem for businesses. applicationpro ® can tackle this problem
from 2 directions: a) by only allowing the start of applications that may be executed in your corporate network
(whitelisting) b) by only allowing the start of applications that have not been prohibited (blacklist / procedures). Af-
ter all, the unintentional running of malware and spyware can cause enormous economic damage, while the installa-
tion of unlicensed software by users generally leads to higher support costs and may have unpleasant consequences
at the next software audit.


YOUR BENEFITS
   Applicationpro does not rely on the
   signature of malicious applications, it
   blocks all unauthorized programs di-
   rectly thus complementing your anti-
   virus solution.
   Only applications approved by the IT
   management can be started.
   Helpdesk incidents caused by unau-
   thorized software are eliminated.

SELECTED FEATURES
    Intelligent Learning mode records all
    programs that have been used by a
    user or a user group within a specified
    time frame. This allows you to easily
    and effortlessly create user group spe-
    cific white lists.
    Simple, wizard-assisted creation of
    software packages.                                      The Learning Mode facilitates administration by automatically recording all
                                                            applications that are executed by members of a specific user group within a
    Flexible assignment of software pack-                                               defined time frame.
    ages to roles such as marketing or ad-
    ministration.




 Risks caused by Private Usage
    Many employees also use their company
    computers for private purposes, which is
    often tolerated by employers. Without
    central management, however, it is diffi-
    cult to draw clear boundaries. Costs and
    risks arise for the employer when ...
    employees play games or watch movies
    during working hours.
    virus-infected software, video clips or
    games are installed.
    unlicensed software is installed.
    support staff spends time to resolve
    problems caused by unauthorized soft-
    ware.

                                                          Registered applications can be grouped by manufacturer, or by using any other
cynapspro                                                           Endpoint Data Protection

cynapspro develops software solutions for reliable
endpoint data protection in the enterprise network
and covers the following areas:
DevicePro prevents data loss through open ports and
external storage devices.
CryptionPro encrypts and protects your company
data on mobile storage media – fully automated.
CryptionPro HDD protects your company data by en-
crypting the hard drive.
ApplicationPro blocks unwanted applications and
prevents the use of unlicensed software.
ErasePro ensures that deleted files are not recover-
able.
PowerPro cuts energy costs and reports suspicious
activity.

The following features distinguish all cynapspro                    pected data abuse or loss, cynapspro knows which
solutions:                                                          files have been accessed, by whom and when.

Intuitive Management Console                                        Minimal System Requirements
The single user-friendly Management Console is                      Apart from a SQL database (the free MSDE or SQL
largely self-explanatory and only a minimum of train-               Server 2005 Express edition are fully sufficient), there
ing is required. The clear and concise structure allows             is no additional software required, such as the IIS
the compilation of complex setting with just a few                  Server or .NET client. Consequently, no new vulner-
mouse clicks.                                                       abilities are introduced by installing additional back
                                                                    office software and memory and CPU utilization is
Real-Time Management                                                minimal.
All changes to access permissions will be immediately
pushed out to the clients and stored in the cynapspro               Secure Kernel Driver Technology
database. Users don’t need to restart their machines                The secure cynapspro® kernel driver technology is
or even connect to the company network in order to                  loaded into the operating system during the boot
upgrade their usage rights.                                         sequence and thus ensures that the service running
                                                                    on the client is not visible to the end user. It can only
Rights Management at Group Level, User Level or                     be stopped or uninstalled by an authorized Adminis-
Computer Level                                                      trator.
Reduce your administrative effort. Manage individual
access rights directly with the respective users,                   Integration with Third Party Applications
groups or computers.                                                An XML interface allows the allocation of access per-
                                                                    missions from an existing customer Helpdesk or Ser-
Synchronization of User Directories                                 vice Desk implementation in a fully automated way,
Existing users and user group definitions from Micro-               leveraging existing processes, approval workflows,
soft Active Directory or Novell eDirectory are im-                  notifications and management reports. There will be
ported by the cynapspro server thus reducing the                    no need for service desk workers to use an additional
workload for defining user groups for Access Client                 console.
Lists (ACLs) as well as the sources of error.
                                                                    Distributed Environments
Full Audit Log                                                      Several mutually replicating cynapspro servers pro-
Password-protected, detailed access statistics with                 vide load balancing capabilities in enterprise environ-
filter and sort order functionality. In case of sus-                ments.

Free Trial Version                                                  Contact
On the cynapspro website, we offer a full version                   cynapspro GmbH
of our software for download, including a free 5-                   Am Hardtwald 1
user license.                                                       D-76275 Ettlingen
Please contact us if you are interested in testing                  Tel.: +49 7243 / 945-250
our software in a larger environment.                               Email: contact@cynapspro.com
                                                                    Internet: www.cynapspro.com

                                March 2010 - Copyright cynapspro GmbH 2010—All rights reserved.

Weitere ähnliche Inhalte

Was ist angesagt?

Bus Tour Windows 7 Deck (Full)
Bus Tour   Windows 7 Deck (Full)Bus Tour   Windows 7 Deck (Full)
Bus Tour Windows 7 Deck (Full)
Stephen L Rose
 
Sccm 2012
Sccm 2012Sccm 2012
Sccm 2012
ebuc
 
System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 Overview
Amit Gatenyo
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
Microsoft Singapore
 
Application Virtualization overview - BayCUG
Application Virtualization overview - BayCUGApplication Virtualization overview - BayCUG
Application Virtualization overview - BayCUG
Denis Gundarev
 
Ehealth systemedge-product-brief-us
Ehealth systemedge-product-brief-usEhealth systemedge-product-brief-us
Ehealth systemedge-product-brief-us
gopi01
 
Riding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_pRiding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_p
Microsoft Singapore
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component
C/D/H Technology Consultants
 

Was ist angesagt? (20)

2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview
 
Bus Tour Windows 7 Deck (Full)
Bus Tour   Windows 7 Deck (Full)Bus Tour   Windows 7 Deck (Full)
Bus Tour Windows 7 Deck (Full)
 
Sccm 2012
Sccm 2012Sccm 2012
Sccm 2012
 
Installation
InstallationInstallation
Installation
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012
 
Microsoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 InstallationMicrosoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 Installation
 
System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 Overview
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
NIST Definition of Cloud Computing
NIST Definition of Cloud ComputingNIST Definition of Cloud Computing
NIST Definition of Cloud Computing
 
Install Desk Product Information
Install Desk Product InformationInstall Desk Product Information
Install Desk Product Information
 
Application Virtualization overview - BayCUG
Application Virtualization overview - BayCUGApplication Virtualization overview - BayCUG
Application Virtualization overview - BayCUG
 
CENTRALIZED MANAGEMENT APPLIANCES
CENTRALIZED MANAGEMENT APPLIANCESCENTRALIZED MANAGEMENT APPLIANCES
CENTRALIZED MANAGEMENT APPLIANCES
 
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution BriefDATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
 
Ehealth systemedge-product-brief-us
Ehealth systemedge-product-brief-usEhealth systemedge-product-brief-us
Ehealth systemedge-product-brief-us
 
Riding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_pRiding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_p
 
SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
 
Application Virtualization presentation
Application Virtualization presentationApplication Virtualization presentation
Application Virtualization presentation
 
What is My easy center 2.0 for SCCM ?
What is My easy center 2.0 for SCCM ?What is My easy center 2.0 for SCCM ?
What is My easy center 2.0 for SCCM ?
 
SCOM: The Unsung Hero of the System Center Suite April 24, 2013
SCOM: The Unsung Hero of the System Center Suite April 24, 2013SCOM: The Unsung Hero of the System Center Suite April 24, 2013
SCOM: The Unsung Hero of the System Center Suite April 24, 2013
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component
 

Andere mochten auch

HARDWARE
HARDWAREHARDWARE
HARDWARE
Rocio
 
Tratamiento de imágenes
Tratamiento de imágenesTratamiento de imágenes
Tratamiento de imágenes
NoemiYMarta
 
La ley sopa ,pipa y el cierre
La ley sopa ,pipa y el cierreLa ley sopa ,pipa y el cierre
La ley sopa ,pipa y el cierre
JoseAndreZuta
 
Conferencia%20 Latapi%20 Merida%2007
Conferencia%20 Latapi%20 Merida%2007Conferencia%20 Latapi%20 Merida%2007
Conferencia%20 Latapi%20 Merida%2007
SEP
 
Ii Responsab Social Etica(2)
Ii Responsab Social Etica(2)Ii Responsab Social Etica(2)
Ii Responsab Social Etica(2)
forevervicux
 
Educacion Virtual
Educacion VirtualEducacion Virtual
Educacion Virtual
guestbb1580
 
Bloque 1 introducción
Bloque 1   introducciónBloque 1   introducción
Bloque 1 introducción
TIC System
 
que realiza el personal cuando entra un paciente al hospital
que realiza el personal cuando entra un paciente al hospitalque realiza el personal cuando entra un paciente al hospital
que realiza el personal cuando entra un paciente al hospital
Brizeida Garcia
 
Conceptos generales de las ecuaciones difernciales de primer grado
Conceptos generales de las ecuaciones difernciales de primer gradoConceptos generales de las ecuaciones difernciales de primer grado
Conceptos generales de las ecuaciones difernciales de primer grado
Santiago Morales Ruiz
 

Andere mochten auch (20)

RTE_Extremadura
RTE_ExtremaduraRTE_Extremadura
RTE_Extremadura
 
HARDWARE
HARDWAREHARDWARE
HARDWARE
 
Tratamiento de imágenes
Tratamiento de imágenesTratamiento de imágenes
Tratamiento de imágenes
 
La ley sopa ,pipa y el cierre
La ley sopa ,pipa y el cierreLa ley sopa ,pipa y el cierre
La ley sopa ,pipa y el cierre
 
Trabajo digital en la plataforma HELVIA con DESCARTES, EDA 2007
Trabajo digital en la plataforma HELVIA con DESCARTES, EDA 2007Trabajo digital en la plataforma HELVIA con DESCARTES, EDA 2007
Trabajo digital en la plataforma HELVIA con DESCARTES, EDA 2007
 
Clase2
Clase2Clase2
Clase2
 
Página Web
Página WebPágina Web
Página Web
 
Conferencia%20 Latapi%20 Merida%2007
Conferencia%20 Latapi%20 Merida%2007Conferencia%20 Latapi%20 Merida%2007
Conferencia%20 Latapi%20 Merida%2007
 
Violencia
ViolenciaViolencia
Violencia
 
Ii Responsab Social Etica(2)
Ii Responsab Social Etica(2)Ii Responsab Social Etica(2)
Ii Responsab Social Etica(2)
 
Miprimerapagina
MiprimerapaginaMiprimerapagina
Miprimerapagina
 
Tarjetas digitales 2.0
Tarjetas digitales 2.0Tarjetas digitales 2.0
Tarjetas digitales 2.0
 
Educacion Virtual
Educacion VirtualEducacion Virtual
Educacion Virtual
 
Presentación wiki 2
Presentación wiki 2Presentación wiki 2
Presentación wiki 2
 
Redaccion
RedaccionRedaccion
Redaccion
 
Realismo
RealismoRealismo
Realismo
 
Bloque 1 introducción
Bloque 1   introducciónBloque 1   introducción
Bloque 1 introducción
 
que realiza el personal cuando entra un paciente al hospital
que realiza el personal cuando entra un paciente al hospitalque realiza el personal cuando entra un paciente al hospital
que realiza el personal cuando entra un paciente al hospital
 
Proyecto6
Proyecto6Proyecto6
Proyecto6
 
Conceptos generales de las ecuaciones difernciales de primer grado
Conceptos generales de las ecuaciones difernciales de primer gradoConceptos generales de las ecuaciones difernciales de primer grado
Conceptos generales de las ecuaciones difernciales de primer grado
 

Ähnlich wie ApplicationPro Flyer English

Application Virtualization
Application VirtualizationApplication Virtualization
Application Virtualization
Amit Gatenyo
 
Thin Provisioning Comparison
Thin Provisioning ComparisonThin Provisioning Comparison
Thin Provisioning Comparison
lneut03
 
Cisco and The Applied Group Point of View
Cisco and The Applied Group Point of ViewCisco and The Applied Group Point of View
Cisco and The Applied Group Point of View
David Barry
 

Ähnlich wie ApplicationPro Flyer English (20)

DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer English
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA software
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application Virtualization
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
Thin Provisioning Comparison
Thin Provisioning ComparisonThin Provisioning Comparison
Thin Provisioning Comparison
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
 
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del RansomwareWebinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del Ransomware
 
Anti Key Logging And Real Time Encryption Software
Anti Key Logging And Real Time Encryption SoftwareAnti Key Logging And Real Time Encryption Software
Anti Key Logging And Real Time Encryption Software
 
AV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewAV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software review
 
What is Application & Server Virtualisation
What is Application & Server VirtualisationWhat is Application & Server Virtualisation
What is Application & Server Virtualisation
 
unit5final
unit5finalunit5final
unit5final
 
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
 
MBESProductSheet (1)
MBESProductSheet (1)MBESProductSheet (1)
MBESProductSheet (1)
 
Cisco and The Applied Group Point of View
Cisco and The Applied Group Point of ViewCisco and The Applied Group Point of View
Cisco and The Applied Group Point of View
 
Virtualization 101
Virtualization 101Virtualization 101
Virtualization 101
 
Darwin Overview
Darwin OverviewDarwin Overview
Darwin Overview
 
AVG Managed Workplace 9.1 Fact Sheet
AVG Managed Workplace 9.1 Fact SheetAVG Managed Workplace 9.1 Fact Sheet
AVG Managed Workplace 9.1 Fact Sheet
 
Představení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruPředstavení Oracle SPARC Miniclusteru
Představení Oracle SPARC Miniclusteru
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 

Mehr von cynapspro GmbH

Mehr von cynapspro GmbH (19)

Cynapspro Endpoint Data Protection 2011 - Step By Step Anleitung DevicePro un...
Cynapspro Endpoint Data Protection 2011 - Step By Step Anleitung DevicePro un...Cynapspro Endpoint Data Protection 2011 - Step By Step Anleitung DevicePro un...
Cynapspro Endpoint Data Protection 2011 - Step By Step Anleitung DevicePro un...
 
Cynapspro endpoint data protection 2011 step by-step anleitung device pro und...
Cynapspro endpoint data protection 2011 step by-step anleitung device pro und...Cynapspro endpoint data protection 2011 step by-step anleitung device pro und...
Cynapspro endpoint data protection 2011 step by-step anleitung device pro und...
 
cynapspro endpoint data protection 2010 - technical specifications
cynapspro endpoint data protection 2010 - technical specificationscynapspro endpoint data protection 2010 - technical specifications
cynapspro endpoint data protection 2010 - technical specifications
 
cynapspro endpoint data protection - user guide
cynapspro endpoint data protection -  user guidecynapspro endpoint data protection -  user guide
cynapspro endpoint data protection - user guide
 
cynapspro endpoint data protection - installation guide
cynapspro endpoint data protection - installation guidecynapspro endpoint data protection - installation guide
cynapspro endpoint data protection - installation guide
 
cynapspro endpoint data protection 2010 - Bedienungsleitfaden
cynapspro endpoint data protection 2010 - Bedienungsleitfadencynapspro endpoint data protection 2010 - Bedienungsleitfaden
cynapspro endpoint data protection 2010 - Bedienungsleitfaden
 
Cynapspro data endpoint protection - Anbindung von Drittsysteme
Cynapspro data endpoint protection - Anbindung von DrittsystemeCynapspro data endpoint protection - Anbindung von Drittsysteme
Cynapspro data endpoint protection - Anbindung von Drittsysteme
 
cynapspro data endpoint protection 2010 - Installationsleitfaden
cynapspro data endpoint protection 2010 - Installationsleitfadencynapspro data endpoint protection 2010 - Installationsleitfaden
cynapspro data endpoint protection 2010 - Installationsleitfaden
 
CryptionPro HDD Flyer deutsch
CryptionPro HDD Flyer deutschCryptionPro HDD Flyer deutsch
CryptionPro HDD Flyer deutsch
 
DevicePro Flyer deutsch
DevicePro Flyer deutschDevicePro Flyer deutsch
DevicePro Flyer deutsch
 
CryptionPro HDD Flyer deutsch
CryptionPro HDD Flyer deutschCryptionPro HDD Flyer deutsch
CryptionPro HDD Flyer deutsch
 
PowerPro Flyer deutsch
PowerPro Flyer deutschPowerPro Flyer deutsch
PowerPro Flyer deutsch
 
ErasePro Flyer deutsch
ErasePro Flyer deutschErasePro Flyer deutsch
ErasePro Flyer deutsch
 
Cryption proflyer de
Cryption proflyer deCryption proflyer de
Cryption proflyer de
 
ApplicationPro Flyer deutsch
ApplicationPro Flyer deutschApplicationPro Flyer deutsch
ApplicationPro Flyer deutsch
 
Screenshots von DevicePro 2009
Screenshots von DevicePro 2009Screenshots von DevicePro 2009
Screenshots von DevicePro 2009
 
Screenshots von DevicePro 2009
Screenshots von DevicePro 2009Screenshots von DevicePro 2009
Screenshots von DevicePro 2009
 
DevicePro Ultimate 2009 - Efficient Data Loss Prevention Solution
DevicePro Ultimate 2009 - Efficient Data Loss Prevention SolutionDevicePro Ultimate 2009 - Efficient Data Loss Prevention Solution
DevicePro Ultimate 2009 - Efficient Data Loss Prevention Solution
 
DevicePro Ultimate 2009 - Die Loesung - Ihre Vorteile - Das Unternehmen
DevicePro Ultimate 2009 - Die Loesung - Ihre Vorteile - Das UnternehmenDevicePro Ultimate 2009 - Die Loesung - Ihre Vorteile - Das Unternehmen
DevicePro Ultimate 2009 - Die Loesung - Ihre Vorteile - Das Unternehmen
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

ApplicationPro Flyer English

  • 1. ApplicationPro ApplicationPro stops the execution of unauthorized applications The uncontrolled use of applications is a growing problem for businesses. applicationpro ® can tackle this problem from 2 directions: a) by only allowing the start of applications that may be executed in your corporate network (whitelisting) b) by only allowing the start of applications that have not been prohibited (blacklist / procedures). Af- ter all, the unintentional running of malware and spyware can cause enormous economic damage, while the installa- tion of unlicensed software by users generally leads to higher support costs and may have unpleasant consequences at the next software audit. YOUR BENEFITS Applicationpro does not rely on the signature of malicious applications, it blocks all unauthorized programs di- rectly thus complementing your anti- virus solution. Only applications approved by the IT management can be started. Helpdesk incidents caused by unau- thorized software are eliminated. SELECTED FEATURES Intelligent Learning mode records all programs that have been used by a user or a user group within a specified time frame. This allows you to easily and effortlessly create user group spe- cific white lists. Simple, wizard-assisted creation of software packages. The Learning Mode facilitates administration by automatically recording all applications that are executed by members of a specific user group within a Flexible assignment of software pack- defined time frame. ages to roles such as marketing or ad- ministration. Risks caused by Private Usage Many employees also use their company computers for private purposes, which is often tolerated by employers. Without central management, however, it is diffi- cult to draw clear boundaries. Costs and risks arise for the employer when ... employees play games or watch movies during working hours. virus-infected software, video clips or games are installed. unlicensed software is installed. support staff spends time to resolve problems caused by unauthorized soft- ware. Registered applications can be grouped by manufacturer, or by using any other
  • 2. cynapspro Endpoint Data Protection cynapspro develops software solutions for reliable endpoint data protection in the enterprise network and covers the following areas: DevicePro prevents data loss through open ports and external storage devices. CryptionPro encrypts and protects your company data on mobile storage media – fully automated. CryptionPro HDD protects your company data by en- crypting the hard drive. ApplicationPro blocks unwanted applications and prevents the use of unlicensed software. ErasePro ensures that deleted files are not recover- able. PowerPro cuts energy costs and reports suspicious activity. The following features distinguish all cynapspro pected data abuse or loss, cynapspro knows which solutions: files have been accessed, by whom and when. Intuitive Management Console Minimal System Requirements The single user-friendly Management Console is Apart from a SQL database (the free MSDE or SQL largely self-explanatory and only a minimum of train- Server 2005 Express edition are fully sufficient), there ing is required. The clear and concise structure allows is no additional software required, such as the IIS the compilation of complex setting with just a few Server or .NET client. Consequently, no new vulner- mouse clicks. abilities are introduced by installing additional back office software and memory and CPU utilization is Real-Time Management minimal. All changes to access permissions will be immediately pushed out to the clients and stored in the cynapspro Secure Kernel Driver Technology database. Users don’t need to restart their machines The secure cynapspro® kernel driver technology is or even connect to the company network in order to loaded into the operating system during the boot upgrade their usage rights. sequence and thus ensures that the service running on the client is not visible to the end user. It can only Rights Management at Group Level, User Level or be stopped or uninstalled by an authorized Adminis- Computer Level trator. Reduce your administrative effort. Manage individual access rights directly with the respective users, Integration with Third Party Applications groups or computers. An XML interface allows the allocation of access per- missions from an existing customer Helpdesk or Ser- Synchronization of User Directories vice Desk implementation in a fully automated way, Existing users and user group definitions from Micro- leveraging existing processes, approval workflows, soft Active Directory or Novell eDirectory are im- notifications and management reports. There will be ported by the cynapspro server thus reducing the no need for service desk workers to use an additional workload for defining user groups for Access Client console. Lists (ACLs) as well as the sources of error. Distributed Environments Full Audit Log Several mutually replicating cynapspro servers pro- Password-protected, detailed access statistics with vide load balancing capabilities in enterprise environ- filter and sort order functionality. In case of sus- ments. Free Trial Version Contact On the cynapspro website, we offer a full version cynapspro GmbH of our software for download, including a free 5- Am Hardtwald 1 user license. D-76275 Ettlingen Please contact us if you are interested in testing Tel.: +49 7243 / 945-250 our software in a larger environment. Email: contact@cynapspro.com Internet: www.cynapspro.com March 2010 - Copyright cynapspro GmbH 2010—All rights reserved.