InterGuard defends the business from all insider threats.

Request Information

Compatibility

  • down-arrow Citrix Virtual Desktops
    7.5, 7.1

Product Details

InterGuard is a complete insider threat prevention platform that protects companies from the full spectrum of internal threats (threats that originate from inside the organization) such as leakage of condential data from the organization, loss of employee productivity, inappropriate employee behavior, and the damage caused by a lost or stolen laptop. Deployed at the endpoint and delivered in a SaaS format, InterGuard requires no hardware.

Deployed at the endpoint, clients can access 4 technologies including DLP, Web Filtering, Employee Monitoring and Laptop Recovery, through one agent download and one User Interface. It’s offered as both a complete suite and as four individual modules.

InterGuard defends the business from all insider threats.

Features

Data Loss Prevention

  • Enforce corporate policies both on and off the network
  • Block both business and personal email
  • Control Removable Media, even when not connected to the Internet
  • Easy and intuitive Policy creation
  • Formats all data into easy-to-read reports
  • No hardware required
  • Downloads in minutes
  • New- now record all text messages and emails from Smartphones 

Web Filtering

  • Block based on categories
  • Block based on a "white list"
  • Monitor URLs visited
  • Record all Web Searches
  • Take screenshots of web activity
  • Control use of applications
  • Formats all data into easy-to-read reports
  • No hardware required
  • Downloads in minutes

Employee Monitoring

  • Records all computer activity (Emails, IMs, websites and keystrokes)
  • Blocks and reports on all applications & websites
  • Conclusive, actionable evidence in dashboard reports
  • Track productivity via employee activity reports
  • Works invisibly
  • Formats all data into easy-to-read reports
  • No hardware required
  • Downloads in minutes
  • New - now record all text messages and emails from Smartphones

Laptop Recovery

  • Geo-locates the stolen laptop
  • Remotely retrieve files
  • Remotely delete files
  • Delete to highest Pentagon standards
  • Lock down laptop
  • Formats all data into easy-to-read reports
  • No hardware required
  • Downloads in minutes