View
Sorting
From A to Z
Products found: 2
ReSec Technologies ReSecure Endpoint
The ReSecure Endpoint agent is deployed directly on end-users’ computers and integrated with all common device control. Files loaded on the endpoint from external devices are intercepted and sent directly from the external device to the ReSecure platform for processing according to policy, and threat free replicas are placed in a predefined folder on the network or endpoint.
How Does It Work?
- End-user connects the USB device to the desktop or laptop
- Network device control recognizes the device and activates the ReSecure Endpoint agent and UI
- End-user chooses the files to copy to the endpoint computer
- Once selected, ReSecure Endpoint fetches the files from the device, transfer them to the ReSecure Engine for processing according to policy defined by the Active Directory
- A threat-free replica file is delivered to the predefined folder on the network or the endpoint
-
-
ROI-
-
19
13
ReSec Technologies ReSecure Mail
ReSecure Mail, one of the ReSecure Platform 360-degree agents, can be installed as a service in the DMZ or in the cloud and connected to the organization’s mail gateway. When an email arrives the ReSecure Mail agent fetches the email, including the body and any attachments, and transfers it to the core of the ReSecure platform. The ReSecure Engine processes the email according to policy and ensures no threats reach the organization. ReSecure Mail transfers the email in real time back to the mail server for delivery to its destination.
How Does It Work?
- Email received by the email gateway
- ReSecure Mail fetches the email
- ReSecure Engine processing
- Policy is enforced and verified with the Active Directory
- ReSecure Mail receives the processed email
- Threat-free email is delivered to the end user via the mail server
-
-
ROI-
-
0
0
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.