Main

Enterprise Electronic Data Surveillance System

Ultimate Security for Business Longevity

Slide 1
Image is not available

On-demand Encryption
Force Encryption
Access Right
Delegation
Document Encryption Center(DEC)
SecurePDF

Image is not available

Storage Device Control
MTP Device Control
File Operation Log
Folder Sharing Control
Web Browsing
Instant Messenger

Image is not available

Software Assets
Hardware Assets
SW License Management
File Deployment
Remote Management
Software Security

客戶數量 - copy
CUSTOMER
0,000+
CLIENT AGENT
0,000+
PATENT
0+
ESTABLISHED
0yr
Slide 1
PRODUCT PREVILIGE
Image is not available
100% Design in Taiwan
Image is not available
ISO 27001 Granted
Image is not available
130+ Patents Granted

What is X-FORT?

Keeping corporate information safe and compliant has never been easy. Organizations are taking steps to make the information safer by increasing security budgets, educating employees on company-wide best practices, and looking for data leak prevention solutions. Each year, data breaches are responsible for costing companies millions of dollars and continues to happen.

X-FORT is a client-server solution that provides a comprehensive endpoint security solution includes Data Leak Prevention, Data Protection, IT Asset Management, and Endpoint Detection & Response. It protects confidential information against insider threat and malicious behavior; besides, it can detect and respond to abnormal events.

 

Functions include Control, Manage, Monitor, React, and Audit. 

  • Control removable devices and any connected peripheral devices.
  • Monitor network activities, such as web application, instant message, SMB shares, email, and FTP.
  • Manage hardware assets, software license, and application whitelist.
  • Provide file encryption to strengthen the protection.
  • Get comprehensive endpoint activity log for analysis and forensic.
  • Monitor and detect irregularities, and response proactively to reduce risk.
  • Real-time and interactive dashboard help audit and investigate potential threats.

 

Features

  • One agent protects everywhere.
  • Role-based access control and management.
  • Efficient and easy to deploy and use.
  • Function module required on demand.

 

Client Agent Function

Category

Module

Function

Description

D

L

P

Local Security

Storage Device Control

  • Flexible control mode: Disable, read-only, plaintext, encryption
  • Support external HDD, USB drive, SD card, MP3, etc.
  • External storage device registration method: Hardware, software, serial number
  • MTP (smart phone) control
  • MBR and BitLocker disk protection: Protecting data from access HDD by other system

Adv. Storage Device Control

  • Copy file to external storage device with supervisor approval
  • Limit size of daily copy or single file to an external storage device

CD/DVD Control

  • Disable disc recorder (CD / DVD / HD DVD / Blu-ray) and disable burning applications
  • X-BURN
    • Burned into ciphertext or plaintext with comprehensive log & alert
    • Burn CD/DVD with supervisor approval

Printing Control

  • Configure printing policy for each local or network printer
  • Watermark enforcement
  • Backup the printed pages or file
  • Allow temporary printing or cancel watermark with supervisor approval

Operation Log

  • System file activity & operation record: Record system file deletion and rename event (includes
    command mode operation)
  • User activity & operation record: (1) Application execution and operation (2) Web browsing (3) OS login & logout (4) File operations includes create, copy, move, rename and delete

Adv.
Operation Log

  • Microsoft Office file access control and log (open, save, save as)
  • Clipboard log (copy, paste text)
  • Record CMD and PowerShell input and output text

Other Control

  • Device lockdown: Prevent using unauthorized device
  • Port and tools protection: IrDA transceiver, Bluetooth, file transfer software, PrtScr key, remote control,
    GHOST, VMware, Virtual Box, Hyper-V, P2P software, SHARE tools, registry editor, sound card, etc.
  • Disable the built-in or USB wireless network card
  • General device control: Disable devices in Windows Device Manager
  • Control Windows virtual devices, e.g., mobile phones, digital cameras, MP3 phones

X-DISK

  • Private encryption virtual drives: Store important files, and record user's behavior on X-DISK

Network Security

Folder Sharing Control

  • Network folder sharing control: Disable, access record, backup files transfer
  • Email notification while network traffic and the number of file deletion exceed the threshold

Connection Control

  • Enable or disable communication ports, e.g., FTP, HTTP
  • Allow to use communication port with supervisor approval
  • Application access control & network access control

Transfer Control

  • IM control: Disable IM software, disable file transfer, disable screen snapshot, disable desktop sharing
    and record chat message. (Support Line, Skype, Tencent QQ, WeChat, AliWangWang)
  • Video Conferencing Application control: Disable file transfer; log and backup transferred file (Support
    Microsoft Teams, WhatsApp, Zoom, Webex Meetings, Webex Teams, DingTalk, BlueJeans, GoToMeeting,
    Slack, Chatwork, Telegram, Viber)
  • FTP: Disable FTP or record & backup FTP transfer
  • Wireless access: (1) Disable 3G / 4G & dial-up application(2) Disable WiFi service

Web Browsing Control

  • Web access control:
    • Record user browsing behavior, search term and tag visited destination country
    • Allow user to browse website during specific period (e.g., browse Facebook after hours)
    • HTTPS control: Support user defined blacklist and whitelist, and record blocked website browsing.
  • Advanced web access control: Disable open file, save as, printing, keyboard, copy, paste, drag & drop,
    backup upload files
  • Network traffic monitoring: Daily upload and download traffic alerts
  • Allow web access with supervisor approval

Cloud Control

  • Control sync application and URL of cloud drive
  • Control web based cloud service
  • Control application using HTTPS connection (TLS / SSL)
  • Control Microsoft Office save as to cloud drive

Web Content Log

  • Record content of web page
  • Support HTTPS/HTTP

Webmail Log

  • Retrieve webmail text content of Outlook.com, Yahoo! Mail, Gmail and Openfind Mail2000
  • Backup the attachment of Yahoo! Mail and Openfind Mail2000

E-mail Control

  • Allow specified SMTP mail server
  • Record and backup e-mail content
  • Support Outlook client

Outlook
Attachment Encryption

  • Auto encrypt the attachments while sending e-mail
  • Send the decryption password with supervisor approval
  • Prohibit email sending with specified domain name or keywords, and record blocked activity

Secure Virtual
Tunnel

  • Only allow client with X-FORT agent to access protected servers
  • Only dedicated users, devices, or software can connect to protected servers
  • The communication uses TLS encryption to prevent MITM

I

T

A

M

IT Asset Mgmt

Software Security

Application Execution Control

  • Record prohibited and unmanaged application execution
  • Allow to execute specified application during specific period
  • Allow application execution with supervisor approval

Folder Access Control

  • Isolate files in safe zone to prevent malicious access, e.g., ransomware
  • Only specified software allow access safe zone

Advanced
Application
Control

  • Disable the function of specified application: open file, save as, printing, keyboard,
    copy, paste, drag & drop, and backup upload files
  • Gradient style screen watermark: Avoid color absorption by background

Software Assets

  • Software asset management: (1)Software license management and allocation (2)Software suite and
    alias management
  • Hotfix management and Registry management
  • Enforce remotely uninstall software

Hardware Assets

  • Hardware asset management
  • Hard drive utilization information & alert
  • Procurement management of computer hardware and generic equipment
  • Lifecycle management of assets

Remote

Mgmt

Remote Function

  • Remote wake-up, logout, reboot and shutdown the client
  • File deployment: Support for immediate or scheduled delivery, file transfer, transmission bandwidth management, and seeding delivery
  • Message broadcast
  • Remote view and control computer
  • Online help desk and service satisfaction survey
  • Remote scan and find the files with specific keywords
  • X-Monitor
    • Support multi grid view on one screen
    • Supervisor can Live monitor the computer screen

Screen Capture

  • Capture screenshots at predefined time intervals
  • Capture screenshots while execute specific application
  • Adjustable image quality and interval time
  • Screen capture with specific operation, e.g., switch windows, copy to clipboard, Microsoft Office operation

D
A
T
A

P
R
O
T
E
C
T
I
O
N

Document Mgmt

Content
Filter and
Classification

  • Filter by regular expression and keyword
  • ilter content of file while writing file to external storage device, sending file on IM software, and emailing
    attachment in Outlook; When match the rule, block the actions, backup the files, and add tag in the log
  • Webmail: filter mail content and attachment, when match the rule, backup the files, and add tag in the log

File Locker

  • User decides to encrypt the files, support encrypt single file or batch
  • User-friendly: double-click file to auto decrypt file; auto encrypt when file close
  • DEF (Document Encryption Folder)
    • Auto encrypt all files in the DEF folder, and auto encrypt new files
    • Applicable root directory and cloud sync folder (Server OS is not applicable)

S
Y
S
T
E
M

M
G
M
T

EDR

Incident
Response

  • Monitoring and detecting irregularities
  • Proactive response to mitigate risk, including screen watermark, alert, restrict network access, block
    untrusted storage, and block printing
  • Record various violations, response actions and remediation
System Mgmt 

Client

  • Self-protection: Prevent agent destroyed by malicious user or application
  • Support Windows safe mode and AD user profile roaming
  • Security incidents alert and notification

 

Server Function

Category

Module

Function

Description

S
Y
S
T
E
M

M
G
M
T

Server

Main Server

  • Support database backup and restore
  • Optimized server and client data exchange bandwidth
  • File encryption with PKI & AES-256, support HSM key management
  • Single server supports more than 1,000 Clients
  • Support Microsoft Azure, private cloud, public cloud, and hybrid cloud
  • Store backup files on relay server
Console
  • Multi-language support: English / Japanese / Traditional Chinese / Simplified Chinese
  • Role-based management: Administrators, group managers, auditors, and others
  • Compliant with password complexity, password length requirements, and password change enforcement

Backup Server

  • Multi-server support active-active load balance, assign client to specified server based on network segments

The specification may vary depending on X-FORT version.


Hardware


X-FORT Server Specification

Device Qty.
100 CALs
500CALs
1000+CALs
CPU
Intel i5/4-core or higher
Intel i5/4-core or higher
Intel i7/4-core or higher
RAM
8GB or more
12GB or more
16GB or more
HDD
500GB or more
750GB SAS or more
1TB SAS or more
Network
100Mbps
1,000Mbps
1,000Mbps
  • X-FORT Server and Database Server may install on the same server, and the RAM require 8GB available or more , CPU require 2.3GHz Xeon 4-Core or higher. 
  • Recommend to set up at least one additional server for load balance and backup.

Database Server Specification

Device Qty.
100CALs
500CALs
1000+CALs
CPU
Intel i5/4-core or higher
Intel i5/4-core or higher
Intel i7/4-core or higher
RAM
8GB or more
16GB or more
32GB or more
HDD
500GB or more
1TB SAS or more
2TB SAS or more
Network
100Mbps
1,000Mbps
1,000Mbps
  •  HDD space requirement depends on amount of record.

X-FORT Client Specification

CPU
Core i3 or higher
RAM
8GB or more
HDD
Recommend 400MB or more for installation and 20% available space after installation.
 

Software


X-FORT Server Specification

Windows platform
Windows Server 2022
Windows Server 2019
Windows Server 2016
Java VM
Amazon Corretto 17 or later
IIS
8.0 or later
.Net Framework
4.8 or later (W-Console requires Windows Server 2016 or later)
Directory Service
Microsoft Windows Active Directory


Database Server Specification

Windows Platform
Windows Server 2022
Windows Server 2019
Windows Server 2016
Database Version
Microsoft SQL Server 2022
Microsoft SQL Server 2019
Microsoft SQL Server 2016
Microsoft SQL Server 2014
 

X-FORT Client Specification

Windows Platform
Windows 11, 10, 8.1, 7 (Partial Support) 
Windows Server 2022, 2019, 2016 (Support User Access Mode)
  • The above specification exclude Windows Phone and Windows RT for phone or tablet