Information capturing by means of agents at endpoints. It is the fullest method of the System performance. Along with operation with encoded protocols, it is able to maintain control of information exchange, as well as a full-fledged control of devices, applications, web addresses and user activity.
Gateway control does not require installation of the agent application on the user’s PC, it works with non-encoded protocols. It is compatible with any OSs.
Integration with an e-mail server is also a type of agentless capturing and provides control of e-mail activities of users at the level of corporate mail. All information processing is carried out directly, without the need to transfer the captured data from the client node to the server.
Collaboration of SecureTower with Proxy devices by means of ICAP integration provides control of web traffic, filtration and lock-out of activity according to the established security policies. Agent installation on the endpoints is not required.
|Server hardware||Client Console||Endpoints (for agent-based scheme)|
|Processor||2.2+ GHz (4 cores and higher)||2 GHz and higher||600 MHz and higher|
|Network adapters||1 Gb (2 adapters with centralized capturing)||100 Mb/1 Gb|
|RAM||6 GB and higher||minimum 4 GB||256 MB and higher|
|Hard disc||100 GB section for the operating system and SecureTower files (RAID1 / RAID10); a section for storage of captured data on RAID1 / RAID10||300 MB free space||15-25 MB free space|
|Video adapter||support of DirectX 7.0 and higher (display resolution 1024 x 768)|
|Supported OS||Microsoft Windows Server 2008/2012/2016 (x64)||Microsoft Windows XP SP3/Vista/7/8/10/Server 2003/2008/2012/2016 (x86/x64)||Microsoft Windows XP SP3/Vista/7/8/10/Server 2003/2008/2012/2016 (x86/x64)|
|Pre-installed components||Microsoft .Net Framework 4.6 or more recent version, Microsoft Visual C++ Redistributable 2008 и2010 (x86/x64)||Windows .Net Framework: 4.6 or more recent version, Microsoft Visual C++ Redistributable 2008 и 2010 (x86/x64)|
SecureTower information security and risk management system can work with various types of DBMS.
The supported system includes both paid products from Microsoft and Oracle:
and open-source ones:
The volume of data, acquired by the System from one user per month depends on individual monitoring settings, however, the average volume is about 1.7 Gb.
The total volume for a company can be approximately estimated by the specified formula:
Store – capacity in gigabytes (GB), required for storage of captured data
Ratio – coefficient, determining a monthly data volume in GB, captured from one user. The default value is 1.3. When only centralized capturing is used, the coefficient is 0.15. When only mail processing server is used, the coefficient is 0.25. When all server capturing servers are used, the total coefficient is 1.7 (1.3+0.15+0.25)
Users – number of the users under control
Month – number of months during which the data are stored
Index – size of search index, comprising 5% of the captured data size