Contact us

Search


*
Internet Security Mgmt Tools
Popup Blocker
Email Filtering
Privacy Protection Shield
Spyware Blocker
Intrusion Blocker
Hijacker Blocker
Web Script Blocker
* Internet Security Management Tools (ISMT) 

Like the rest of the Gargoyle products, the ISMT features may be programmed in a very dynamic environment.  This means that the individual features may be turned on/off, or individually personalized for specific users and during certain hours of daily operation.

The full user access and security protection goes beyond adequate domain and content filtering requirements.  The existence of an insecure chatty and noisy network requires the use of additional tools to ensure secured user communications, a secured computer system, and a high level of performance. The issues range from severe security threats to user superior expectations and convenience.  The ISMT package provides such tools for the problems such as:

  • User unauthorized on unsupervised web access provides difficulties for parents, businesses, and institutions.  

  • Parents may find it useful to turn off the web access during certain hours of the day.  This allows these working parents to control their children behavior during the working hours, or passed late hours.  

  • The use of computer hardware creates a different, but serious, security and privacy problem because of the potential loss of valuable financial and user information.

  • More troublesome security threats are silent.  For example, many user computers are ‘chatty’ to strangers.  These computers may exchange sensitive information over the Internet without requesting the computer users’ permission.  They may spy on family members or other users, and they may easily exchange very sensitive information with unknown local/remote intruders, and hijackers.

  • The use of the ISMT system may stop online eavesdroppers, and spy agents from obtaining users’ personal messages.  

  • The ISMT system may stop computer local/remote intruders and attackers from hijacking the user computers for illegal purposes. 


*
*
*
Related News and Announcements
*

User and corporate information may be locked against unauthorized user and employee disclosure.

*
*
*

 

Product Home | Products | Services | FAQ
E-Mail: General | Webmaster

Use of this site indicates that you accept the Terms of Use. Copyright (c) 2000-2017 SoftAlleyTM Inc. All rights reserved.