DE|EN
menu
  • Encryption
  • Resource control
  • Authentication
  • Secure identities


Application / Port control

conpal AccessOn

Control of ports, applications and external storage media on endpoint devices


Endpoint devices are a challenge for the IT organization, particularly in distributed organizations. A high degree of flexibility for the user and stable, resilient working environments from the perspective of IT operations often create an area of conflict. conpal AccessOn helps to resolve these conflicts.


Enforcement of standardized, consistent security policies for different endpoint devices and storage media

System security and stability: protection against unauthorized installation or execution of programs – the most enduring protection against viruses and Trojans

Import-export filter (blacklisting and whitelisting): protection against unauthorized import or export of data

Ultra-fine control over what data can be read and written by which users using which applications

Plug and play control: protection against unauthorized use of storage media


conpal AccessOn is a solution for resource control (ports, applications) on the Windows client. On endpoint devices, conpal AccessOn ensures controlled access to the client and to the company network and prevents non-authorized installation and use of hardware and software by the (end) user. Definition of policies allows you to enforce organization-wide settings in relation to the rights of individual users or groups to use data, directories and applications for controlled data import and export. In addition, conpal AccessOn enables centralized management and control of all plug and play devices and provides a remote enable function to rapidly react to “ad hoc” adjustments in distributed environments…

(Flyer)
(EULA)

I am interested in a test version

 
 
 
 
 
 
 
 
 
 
 
 

When you transmit your data by clicking the following button, you agree that we can use this information to answer your request or to contact you. We do not share your information with third-parties, except current privacy laws justify a transfer or we are legally obliged to do so. At any time you have the right to revoke your agreement. In this case your data will be deleted immediately. Your data will also be deleted when your request is finished or the purpose of saving your data becomes obsolete. At any time you can demand information about your personal data.

You can find further information in the privacy policy statement of this website.