Information Leakage: While currently the information leakage module records the use of programs, typed texts and screenshots of what users are seeing and doing, it is now possible to have a photographic record of who is sitting in front of the PC, this is achieved using the webcam of the equipment (if you have one installed), at the time of recording and capturing the screen in use, a photo of the person behind it is made, being able to know the actual user who is performing the tasks.
Program Identification: To know what is happening in your network and why it is slow, it is necessary to know what is being done, so GuardiaN has the ability to identify the programs that are being used (either in real time or through historical reports), as well as to know who is using them, with a very extensive list of approximately 378 programs, ranging from everyday programs (such as WhatsApp, Skype, Spotify, Teamviewer) to less known programs (Radius, Ares, Ldap).
Navigation Limits: It is possible to define a certain time of use of navigation for a team or for the whole company, being able to monitor it in a simple way, controlling the minutes that are used and being able to release them if necessary.
More complete mail reports: It is possible to know not only the senders and recipients of the sent and received mails, but also the computers from which these mails are generated.
Network protection: By simply activating the network protection, GuardiaN is in charge of protecting in real time all attempts to enter and exit your network from and to millions of sites generating harmful traffic (attacks, spam, malware, etc.). This information is accessible in real time or through historical reports.
In addition, some details of operation were corrected, achieving improvements in performance and general operation.
For more information go to: http://i-guardian.biz/
Connect