EagleEyeOS One Free 3.0

EagleEyeOS One Free 3.0 Screenshot One Free Product Description EagleEyeOS One Free suits everybody who do not require the extensive network systems that is typical of the enterprise segment, but they want to determine an access policy to handle the mobile devices (Floppy, CD, DVD, InfraRed, COM, LPT, USB, Bluetooth, Wireless, etc.

Developer:   EagleEyeOS LLC.
      software by EagleEyeOS LLC. →
Price:  0.00
License:   Freeware
File size:   0K
Language:   
OS:   Windows XP/Vista (?)
Rating:   0 /5 (0 votes)

One Free

Product Description


EagleEyeOS One Free suits everybody who do not require the extensive network systems that is typical of the enterprise segment, but they want to determine an access policy to handle the mobile devices (Floppy, CD, DVD, InfraRed, COM, LPT, USB, Bluetooth, Wireless, etc.) in order to protect the data and the proprietary interests. On the computer the mobile devices that could be in use to expropriate the information can be blocked or rather, the activities executed on them can be traced. The program sends alerts to a predefined e-mail address about the connected and unplugged storages, additionally the file operations executed on the storages. Available language versions: English and Hungarian.

Product Details

Pages



Home
The links on this page lead to the developer’s website. Statistical data on the home page show - among others - how many additional storages were connected to the computer, how many qualified events occurred, and - of these - how many were blocked processes, and how many alerts were sent by the software. With Remote Management, computers within the organization can be selected from the local computer centrally; furthermore the settings of those units can be transferred.
Devices
It provides the user with the capability to specify access rights to the generally used communication channels, e.g. Floppy, CD, DVD, Infrared, COM, LPT, USB, Bluetooth, Wireless, etc. The most significant feature of EagleEyeOS™ One is that different devices used to extract data can be blocked irrespectively of their momentary availability and actual connection to the computer. There is the option to log the file movements in case of certain devices, furthermore by using the Alert mode - sending e-mails about the blocked events.
Storages
The product sets up the ability to assign communication rights to portable devices, which are detected by the operating system as file systems and/or drives, e.g. Pen-Drive, camera or the memory of a mobile phone. It recognizes and controls the connected storages to the computer, in runtime; therefore it accomplishes the handling of devices independently of producers and types, furthermore logs the operations. It generates screenshots about the blocked events based on the settings of the storage; additionally sending e-mail notifications of each and every storage connections and disconnections.
Settings
The new Remote Management function helps you to create the rules from a local Host to remote units. You can export, import, and transfer these rules by pressing a button. Beyond the general settings of the software, you can assign the operator who can manage the remote Hosts, notification can be set about the updates of the software, licenses can be activated, and furthermore the customization of the alerts can be done also. The alerts can be timed or scheduled; even the combination of both is supported also, giving the option of the most appropriate alert order.
About
The End User License Agreement can be read here, as well as additional references related to the support and sales of the software also.


Technology



Kernel
The software’s rule enforcement technology works in the kernel of the operating system, between the levels of the access control and the file system. It enables protection processes that cannot be found anywhere else.
Application independence
It monitors and controls the processes at kernel level, so it is completely independent from applications running at user levels.
File system and hardware independence
It builds in the kernel above the file system; therefore, it is completely independent from file system drivers and the physical discs under the drivers.
Support of the non-Microsoft based file
It supports Novell Netware sharing equal to Microsoft Windows sharing, providing all logging protection features on both platforms. The technology can be used without restrictions on both Microsoft Netware Client or Novell Netware Client.
Reproduction independence
Copy recognition is independent from the initiating application. E.g. Explorer, Drag and Drop, Copy and Paste, Print Screen, Command Prompt.
Own protective line
It builds an additional protection line in the kernel under the level of access control. It can block document from the Local and/or the Domain Administrator. Furthermore it opens up the possibility to create separate document territories (Quarantines) securely.
Devices (availability independence)
Communication channels can be controlled irrespective of their actual availability. We can block e.g. the Bluetooth communication on a certain host even if the host is not connected to a Bluetooth device at that moment. The Bluetooth device connected later on will not be able to operate.
Storages (producer and type independence)
Beyond the communication channels, there is a possibility to recognize and control storages connected to the computer in runtime. This makes the management of devices, independent of producer and type (e.g. Pen-Drive, camera, etc.), possible. A major feature is that events made on storages, will be logged; also it is possible to use the Read-Only rule.
Notebook handling
Running on kernel level offers the possibility to keep the defined rules after losing network connection, and to make these rules impossible to by-pass. It is possible to disable the Bluetooth devices and pen-drives on a notebook removed from the network. Furthermore, user activities will be logged locally together with the date and time of the disconnection and reconnection.

tags the computer  about the  the file  from the  file system  the software  how many  communication channels  the kernel  the bluetooth  independent from  and the  alerts can  

EagleEyeOS One Free 3.0 screenshot


Download EagleEyeOS One Free 3.0

 Download EagleEyeOS One Free 3.0


Similar software

EagleEyeOS One Free 3.0 EagleEyeOS One Free 3.0
EagleEyeOS LLC.

One Free Product Description EagleEyeOS One Free suits everybody who do not require the extensive network systems that is typical of the enterprise segment, but they want to determine an access policy to handle the mobile devices (Floppy, CD, DVD, InfraRed, COM, LPT, USB, Bluetooth, Wireless, etc.

BlueAuditor 1.4.2 BlueAuditor 1.4.2
Nsasoft LLC.

BlueAuditor is a private area network auditor and easy-to-use program for detecting and monitoring Bluetooth devices in a wireless network.

Medieval Bluetooth Network Scanner 1.4.0.0 Medieval Bluetooth Network Scanner 1.4.0.0
BlueCiucc

Medieval Bluetooth Network Scanner can analyze and scan your Bluetooth network, giving detailed informations about local and remote devices found.

DeviceLock 6.1.1 Build 8065 DeviceLock 6.1.1 Build 8065
SmartLine Inc

DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWare drives, ZIPs, etc.

SysUtils Device Manager 1.2 SysUtils Device Manager 1.2
SysUtils Software

SysUtils Device Manager – the removable device access control solution.

CallbackDisk 3.0 CallbackDisk 3.0
EldoS Corporation

With CallbackDisk you can create and manage virtual disk devices within your application and expose these disks to Windows as if they were real disk devices.

Infrared Remote Manager 1.7.0 Infrared Remote Manager 1.7.0
Dan Toma

Infrared Remote Manager has the main purpose to learn all the available remote control devices from a home, including radio, infrared and X-10 based, using specific hardware interfaces and then send them directly from your PC.

USB@nywhere 3.1 USB@nywhere 3.1
Intellidriver Inc.

If you want to share USB devices over network and Internet use USB@nywhere.

Mobile Desktop 2.0 Mobile Desktop 2.0
Idokorro Mobile, Inc.

Mobile Desktop is a software client for VNC networks (Virtual Network Computing), Windows Terminal Services and desktop Remote for BlackBerry wireless handheld hardware devices.

BlueSender 2.5 BlueSender 2.5
OLVI Soft

BlueSender is a useful utility that allows you to transfer files from computer equipped with Bluetooth adapter to multiple Bluetooth-enabled devices such as telephones, PDAs and other at a time.