Main

Enterprise Electronic Data Surveillance System

Ultimate Security for Business Longevity

Slide 1
Image is not available

On-demand Encryption
Force Encryption
Access Right
Delegation
Document Encryption Center(DEC)
SecurePDF

Image is not available

Storage Device Control
MTP Device Control
File Operation Log
Folder Sharing Control
Web Browsing
Instant Messenger

Image is not available

Software Assets
Hardware Assets
SW License Management
File Deployment
Remote Management
Software Security

客戶數量 - copy
CUSTOMER
0,000+
CLIENT AGENT
0,000+
PATENT
0+
ESTABLISHED
0yr
Slide 1
PRODUCT PREVILIGE
Image is not available
100% Design in Taiwan
Image is not available
ISO 27001 Granted
Image is not available
130+ Patents Granted

What is X-FORT?

Keeping corporate information safe and compliant has never been easy. Organizations are taking steps to make the information safer by increasing security budgets, educating employees on company-wide best practices, and looking for data leak prevention solutions. Each year, data breaches are responsible for costing companies millions of dollars and continues to happen.

X-FORT is a client-server solution that provides a comprehensive endpoint security solution includes Data Leak Prevention, Data Protection, IT Asset Management, and Endpoint Detection & Response. It protects confidential information against insider threat and malicious behavior; besides, it can detect and respond to abnormal events.

 

Functions include Control, Manage, Monitor, React, and Audit. 

  • Control removable devices and any connected peripheral devices.
  • Monitor network activities, such as web application, instant message, SMB shares, email, and FTP.
  • Manage hardware assets, software license, and application whitelist.
  • Provide file encryption to strengthen the protection.
  • Get comprehensive endpoint activity log for analysis and forensic.
  • Monitor and detect irregularities, and response proactively to reduce risk.
  • Real-time and interactive dashboard help audit and investigate potential threats.

 

Features

  • One agent protects everywhere.
  • Role-based access control and management.
  • Efficient and easy to deploy and use.
  • Function module required on demand.

 

Client Agent Function

Category

Module

Function

Description

D

L

P

Local Security

Storage Device Control

  • Flexible control mode: Disable, read-only, plaintext, encryption
  • Support external HDD, USB drive, SD card, MP3, etc.
  • External storage device registration method: Hardware, software, serial number
  • MTP (smart phone) control
  • MBR and BitLocker disk protection: Protecting data from access HDD by other system

Adv. Storage Device Control

  • Copy file to external storage device with supervisor approval
  • Limit size of daily copy or single file to an external storage device

CD/DVD Control

  • Disable disc recorder (CD / DVD / HD DVD / Blu-ray) and disable burning applications
  • X-BURN
    • Burned into ciphertext or plaintext with comprehensive log & alert
    • Burn CD/DVD with supervisor approval

Printing Control

  • Configure printing policy for each local or network printer
  • Watermark enforcement
  • Backup the printed pages or file
  • Allow temporary printing or cancel watermark with supervisor approval

Operation Log

  • System file activity & operation record: Record system file deletion and rename event (includes
    command mode operation)
  • User activity & operation record: (1) Application execution and operation (2) Web browsing (3) OS login & logout (4) File operations includes create, copy, move, rename and delete

Adv.
Operation Log

  • Microsoft Office file access control and log (open, save, save as)
  • Clipboard log (copy, paste text)
  • Record CMD and PowerShell input and output text

Other Control

  • Device lockdown: Prevent using unauthorized device
  • Port and tools protection: IrDA transceiver, Bluetooth, file transfer software, PrtScr key, remote control,
    GHOST, VMware, Virtual Box, Hyper-V, P2P software, SHARE tools, registry editor, sound card, etc.
  • Disable the built-in or USB wireless network card
  • General device control: Disable devices in Windows Device Manager
  • Control Windows virtual devices, e.g., mobile phones, digital cameras, MP3 phones

X-DISK

  • Private encryption virtual drives: Store important files, and record user's behavior on X-DISK

Network Security

Folder Sharing Control

  • Network folder sharing control: Disable, access record, backup files transfer
  • Email notification while network traffic and the number of file deletion exceed the threshold

Connection Control

  • Enable or disable communication ports, e.g., FTP, HTTP
  • Allow to use communication port with supervisor approval
  • Application access control & network access control

Transfer Control

  • IM control: Disable IM software, disable file transfer, disable screen snapshot, disable desktop sharing
    and record chat message. (Support Line, Skype, Tencent QQ, WeChat, AliWangWang)
  • Video Conferencing Application control: Disable file transfer; log and backup transferred file (Support
    Microsoft Teams, WhatsApp, Zoom, Webex Meetings, Webex Teams, DingTalk, BlueJeans, GoToMeeting,
    Slack, Chatwork, Telegram, Viber)
  • FTP: Disable FTP or record & backup FTP transfer
  • Wireless access: (1) Disable 3G / 4G & dial-up application(2) Disable WiFi service

Web Browsing Control

  • Web access control:
    • Record user browsing behavior, search term and tag visited destination country
    • Allow user to browse website during specific period (e.g., browse Facebook after hours)
    • HTTPS control: Support user defined blacklist and whitelist, and record blocked website browsing.
  • Advanced web access control: Disable open file, save as, printing, keyboard, copy, paste, drag & drop,
    backup upload files
  • Network traffic monitoring: Daily upload and download traffic alerts
  • Allow web access with supervisor approval

Cloud Control

  • Control sync application and URL of cloud drive
  • Control web based cloud service
  • Control application using HTTPS connection (TLS / SSL)
  • Control Microsoft Office save as to cloud drive

Web Content Log

  • Record content of web page
  • Support HTTPS/HTTP

Webmail Log

  • Retrieve webmail text content of Outlook.com, Yahoo! Mail, Gmail and Openfind Mail2000
  • Backup the attachment of Yahoo! Mail and Openfind Mail2000

E-mail Control

  • Allow specified SMTP mail server
  • Record and backup e-mail content
  • Support Outlook client

Outlook
Attachment Encryption

  • Auto encrypt the attachments while sending e-mail
  • Send the decryption password with supervisor approval
  • Prohibit email sending with specified domain name or keywords, and record blocked activity

Secure Virtual
Tunnel

  • Only allow client with X-FORT agent to access protected servers
  • Only dedicated users, devices, or software can connect to protected servers
  • The communication uses TLS encryption to prevent MITM

I

T

A

M

IT Asset Mgmt

Software Security

Application Execution Control

  • Record prohibited and unmanaged application execution
  • Allow to execute specified application during specific period
  • Allow application execution with supervisor approval

Folder Access Control

  • Isolate files in safe zone to prevent malicious access, e.g., ransomware
  • Only specified software allow access safe zone

Advanced
Application
Control

  • Disable the function of specified application: open file, save as, printing, keyboard,
    copy, paste, drag & drop, and backup upload files
  • Gradient style screen watermark: Avoid color absorption by background

Software Assets

  • Software asset management: (1)Software license management and allocation (2)Software suite and
    alias management
  • Hotfix management and Registry management
  • Enforce remotely uninstall software

Hardware Assets

  • Hardware asset management
  • Hard drive utilization information & alert
  • Procurement management of computer hardware and generic equipment
  • Lifecycle management of assets

Remote

Mgmt

Remote Function

  • Remote wake-up, logout, reboot and shutdown the client
  • File deployment: Support for immediate or scheduled delivery, file transfer, transmission bandwidth management, and seeding delivery
  • Message broadcast
  • Remote view and control computer
  • Online help desk and service satisfaction survey
  • Remote scan and find the files with specific keywords
  • X-Monitor
    • Support multi grid view on one screen
    • Supervisor can Live monitor the computer screen

Screen Capture

  • Capture screenshots at predefined time intervals
  • Capture screenshots while execute specific application
  • Adjustable image quality and interval time
  • Screen capture with specific operation, e.g., switch windows, copy to clipboard, Microsoft Office operation

D
A
T
A

P
R
O
T
E
C
T
I
O
N

Document Mgmt

Content
Filter and
Classification

  • Filter by regular expression and keyword
  • ilter content of file while writing file to external storage device, sending file on IM software, and emailing
    attachment in Outlook; When match the rule, block the actions, backup the files, and add tag in the log
  • Webmail: filter mail content and attachment, when match the rule, backup the files, and add tag in the log

File Locker

  • User decides to encrypt the files, support encrypt single file or batch
  • User-friendly: double-click file to auto decrypt file; auto encrypt when file close
  • DEF (Document Encryption Folder)
    • Auto encrypt all files in the DEF folder, and auto encrypt new files
    • Applicable root directory and cloud sync folder (Server OS is not applicable)

S
Y
S
T
E
M

M
G
M
T

EDR

Incident
Response

  • Monitoring and detecting irregularities
  • Proactive response to mitigate risk, including screen watermark, alert, restrict network access, block
    untrusted storage, and block printing
  • Record various violations, response actions and remediation
System Mgmt 

Client

  • Self-protection: Prevent agent destroyed by malicious user or application
  • Support Windows safe mode and AD user profile roaming
  • Security incidents alert and notification

 

Server Function

Category

Module

Function

Description

S
Y
S
T
E
M

M
G
M
T

Server

Main Server

  • Support database backup and restore
  • Optimized server and client data exchange bandwidth
  • File encryption with PKI & AES-256, support HSM key management
  • Single server supports more than 1,000 Clients
  • Support Microsoft Azure, private cloud, public cloud, and hybrid cloud
  • Store backup files on relay server
Console
  • Multi-language support: English / Japanese / Traditional Chinese / Simplified Chinese
  • Role-based management: Administrators, group managers, auditors, and others
  • Compliant with password complexity, password length requirements, and password change enforcement

Backup Server

  • Multi-server support active-active load balance, assign client to specified server based on network segments

1. Comprehensive Enterprise Information Security Policy Control

  • Mandatory access control: implement mandatory protection and control to ensure all enterprise safety policies can be executed.
  • Granular access control: restrict access based on users’ work features. The management authorization system manager, department supervisor, and auditor are assigned respective tasks to ensure information safety policy implementations.
  • Detailed recording: record PC access, file output, and information delivery for future auditing, tracking, and management.
  • User-friendly management interface: set up enterprise information safety policies through the management interface and examine the records/reports for IT personnel monitor purpose.

2. Full-range System Operation Architecture

  • Multiple Self-Invisibility Protection: prevent the user’s deliberate removal of the X-FORT system.
  • Offline operation mode support: the protection mechanism continues to function on a Notebook computer taken outside by a mobile worker.
  • Provision of backup server auto switch mechanism: ensure X-FORT system operates uninterrupted.
  • Provision of Server Load Balance Mechanism: reduce the system load on one single server.

3. Framework Extensibility and Flexibility

  • Solid server-client framework: plan clear operation agreement and establish a solid basis for system development.
  • Module system function: 15 modules are available for enterprises to choose from to extend functionality.
  • Encrypted file roaming: encrypted files can be exchanged and decrypted on trusted system servers.
  • Synchronized server authorization mechanism: support multiple-server management in large enterprises.
  • X-FORT Server supports 32 bytes and 64 bytes PC and fully utilizes the powerful server.

4. Easy System Delivery

  • Integrate AD/NDS/NT/LDAP network and new account management: The security policy setting is delivered and applied by OU/Group/Personnel/PC.
  • Remote deployment: speedy remote install/uninstall client program.
  • System requirements and easy instillation steps: easy system delivery.

5. User-friendly Interface Management

  • Easy operation and speedy learning: users may encrypt/decrypt files with ease.
  • Single Sign On: no pressure for users and no learning cost.