Main

Enterprise Electronic Data Surveillance System

Ultimate Security for Business Longevity

Slide 1
Image is not available

On-demand Encryption
Force Encryption
Access Right
Delegation
Document Encryption Center(DEC)
SecurePDF

Image is not available

Storage Device Control
MTP Device Control
File Operation Log
Folder Sharing Control
Web Browsing
Instant Messenger

Image is not available

Software Assets
Hardware Assets
SW License Management
File Deployment
Remote Management
Software Security

客戶數量 - copy
CUSTOMER
0,000+
CLIENT AGENT
0,000+
PATENT
0+
ESTABLISHED
0yr
Slide 1
PRODUCT PREVILIGE
Image is not available
100% Design in Taiwan
Image is not available
ISO 27001 Granted
Image is not available
130+ Patents Granted

X-ITasset Features

1. Auto Software/Hardware Assets Search

  • The Client-Server framework on the internal network of the enterprise automatically collects software/hardware assets on controlled computers.
  • Hardware assets can be set as standard equipment for future auto inventory use.
  • Changes in software/hardware assets are recorded and warnings are sent out to notify the system manager or department supervisor.

2. Full Record of Computer Access

  • Records in detail the clients’ software operation and displays the software usage rate.
  • Records employees’ website access and time accessed and carries out statistical rankings.
  • Records employees’ file access to reduce the risk of important data being stolen.
  • The frequency of printer access and number of copies printed are recorded in conjunction with printing control and water mark to manage printer use.

3. Authorized/unauthorized Software Management

  • The software authorization is allocated by the manger or system.
  • List authorized and unauthorized software on every computer and send out a warning for unauthorized software usage.
  • Restricted software use will lessen users’ intent to install unauthorized software and reduce the risk of infringement.

4. PC Doctor’s Online Service

  • The control management interface will monitor the efficiency and software run on any controlled computer as basis for problem diagnosis.
  • The computer sends out ‘online service’ for the system manager to remote control and record the problem directly.
  • Synchronized multiple computer monitoring and remote control in case problems arise.
  • Monitor multiple computers and two-way (manager/user) file transfer.

5. HotFix Extraction and Auto-send

  • Fully integrate Microsoft WSUS service mechanisms to obtain the latest HotFix information from Microsoft.
  • Extract HotFix installation status on every controlled computer and compare the disparities with WSUS.
  • Select operation mode update and send HotFix on any computer, and record sent results.

6. Data Analysis Center (optional)

  • The interface designed especially for mangers can be easily accessed through the IE browser.
  • 28 graphics are available on the table to choose from including 12 classes and 50 items of software/hardware assets status, history, etc.
  • The results of monthly/quarterly/yearly history analysis will serve as reference for management decision-making.

7. Energy Saving and Carbon Reducion

  • Analysis computer's electricity consumption
  • Auto turn off, auto transfer to standby or hibernation mode.