EagleEyeOS One Free 3.0

EagleEyeOS One Free 3.0 Screenshot One Free Product Description EagleEyeOS One Free suits everybody who do not require the extensive network systems that is typical of the enterprise segment, but they want to determine an access policy to handle the mobile devices (Floppy, CD, DVD, InfraRed, COM, LPT, USB, Bluetooth, Wireless, etc.

Developer:   EagleEyeOS LLC.
      software by EagleEyeOS LLC. →
Price:  0.00
License:   Freeware
File size:   0K
Language:   
OS:   Windows XP/Vista (?)
Rating:   0 /5 (0 votes)

One Free

Product Description


EagleEyeOS One Free suits everybody who do not require the extensive network systems that is typical of the enterprise segment, but they want to determine an access policy to handle the mobile devices (Floppy, CD, DVD, InfraRed, COM, LPT, USB, Bluetooth, Wireless, etc.) in order to protect the data and the proprietary interests. On the computer the mobile devices that could be in use to expropriate the information can be blocked or rather, the activities executed on them can be traced. The program sends alerts to a predefined e-mail address about the connected and unplugged storages, additionally the file operations executed on the storages. Available language versions: English and Hungarian.

Product Details

Pages



Home
The links on this page lead to the developer’s website. Statistical data on the home page show - among others - how many additional storages were connected to the computer, how many qualified events occurred, and - of these - how many were blocked processes, and how many alerts were sent by the software. With Remote Management, computers within the organization can be selected from the local computer centrally; furthermore the settings of those units can be transferred.
Devices
It provides the user with the capability to specify access rights to the generally used communication channels, e.g. Floppy, CD, DVD, Infrared, COM, LPT, USB, Bluetooth, Wireless, etc. The most significant feature of EagleEyeOS™ One is that different devices used to extract data can be blocked irrespectively of their momentary availability and actual connection to the computer. There is the option to log the file movements in case of certain devices, furthermore by using the Alert mode - sending e-mails about the blocked events.
Storages
The product sets up the ability to assign communication rights to portable devices, which are detected by the operating system as file systems and/or drives, e.g. Pen-Drive, camera or the memory of a mobile phone. It recognizes and controls the connected storages to the computer, in runtime; therefore it accomplishes the handling of devices independently of producers and types, furthermore logs the operations. It generates screenshots about the blocked events based on the settings of the storage; additionally sending e-mail notifications of each and every storage connections and disconnections.
Settings
The new Remote Management function helps you to create the rules from a local Host to remote units. You can export, import, and transfer these rules by pressing a button. Beyond the general settings of the software, you can assign the operator who can manage the remote Hosts, notification can be set about the updates of the software, licenses can be activated, and furthermore the customization of the alerts can be done also. The alerts can be timed or scheduled; even the combination of both is supported also, giving the option of the most appropriate alert order.
About
The End User License Agreement can be read here, as well as additional references related to the support and sales of the software also.


Technology



Kernel
The software’s rule enforcement technology works in the kernel of the operating system, between the levels of the access control and the file system. It enables protection processes that cannot be found anywhere else.
Application independence
It monitors and controls the processes at kernel level, so it is completely independent from applications running at user levels.
File system and hardware independence
It builds in the kernel above the file system; therefore, it is completely independent from file system drivers and the physical discs under the drivers.
Support of the non-Microsoft based file
It supports Novell Netware sharing equal to Microsoft Windows sharing, providing all logging protection features on both platforms. The technology can be used without restrictions on both Microsoft Netware Client or Novell Netware Client.
Reproduction independence
Copy recognition is independent from the initiating application. E.g. Explorer, Drag and Drop, Copy and Paste, Print Screen, Command Prompt.
Own protective line
It builds an additional protection line in the kernel under the level of access control. It can block document from the Local and/or the Domain Administrator. Furthermore it opens up the possibility to create separate document territories (Quarantines) securely.
Devices (availability independence)
Communication channels can be controlled irrespective of their actual availability. We can block e.g. the Bluetooth communication on a certain host even if the host is not connected to a Bluetooth device at that moment. The Bluetooth device connected later on will not be able to operate.
Storages (producer and type independence)
Beyond the communication channels, there is a possibility to recognize and control storages connected to the computer in runtime. This makes the management of devices, independent of producer and type (e.g. Pen-Drive, camera, etc.), possible. A major feature is that events made on storages, will be logged; also it is possible to use the Read-Only rule.
Notebook handling
Running on kernel level offers the possibility to keep the defined rules after losing network connection, and to make these rules impossible to by-pass. It is possible to disable the Bluetooth devices and pen-drives on a notebook removed from the network. Furthermore, user activities will be logged locally together with the date and time of the disconnection and reconnection.

tags the computer  about the  the file  from the  file system  the software  how many  communication channels  the kernel  the bluetooth  independent from  and the  alerts can  

EagleEyeOS One Free 3.0 screenshot


Download EagleEyeOS One Free 3.0

 Download EagleEyeOS One Free 3.0


Authors software

EagleEyeOS One Free 3.0 EagleEyeOS One Free 3.0
EagleEyeOS LLC.

One Free Product Description EagleEyeOS One Free suits everybody who do not require the extensive network systems that is typical of the enterprise segment, but they want to determine an access policy to handle the mobile devices (Floppy, CD, DVD, InfraRed, COM, LPT, USB, Bluetooth, Wireless, etc.

Similar software

EagleEyeOS One Free 3.0 EagleEyeOS One Free 3.0
EagleEyeOS LLC.

One Free Product Description EagleEyeOS One Free suits everybody who do not require the extensive network systems that is typical of the enterprise segment, but they want to determine an access policy to handle the mobile devices (Floppy, CD, DVD, InfraRed, COM, LPT, USB, Bluetooth, Wireless, etc.

Medieval Bluetooth Network Scanner 1.4.0.0 Medieval Bluetooth Network Scanner 1.4.0.0
BlueCiucc

Medieval Bluetooth Network Scanner can analyze and scan your Bluetooth network, giving detailed informations about local and remote devices found.

Infrared Remote Manager 1.7.0 Infrared Remote Manager 1.7.0
Dan Toma

Infrared Remote Manager has the main purpose to learn all the available remote control devices from a home, including radio, infrared and X-10 based, using specific hardware interfaces and then send them directly from your PC.

RemotePC Server 2.0 RemotePC Server 2.0
MyCoolSoftware

RemotePC Server is a free tool which makes you to control your computer from Mobile Phone over GPRS and Bluetooth.

USBDeview 1.03 USBDeview 1.03
Nir Sofer

USBDeview is a small utility that lists all USB devices that are currently connected to your computer, as well as all USB devices that you previously used.

SysJewel 1.1(Build SysJewel 1.1(Build
SysJewel

SysJewel will collect hardware and software information from the computer.

PCISniffer 2 PCISniffer 2
miray Software

PCISniffer is a tool that scans all PCI busses in the PC and detects automatically which busses and devices are present.

HWareInfo 1.01 HWareInfo 1.01
n37-dev

HWareInfo is a simple command line tool that will allow you to get a brief report containing information on the devices connected to your system.

Kernel Filter for Content Protection 1.0 Kernel Filter for Content Protection 1.0
Kernel Filter System

Kernel Filter is a new technology developed by SecuTech Solution Inc.

MyGSM 1.87 MyGSM 1.87
DeepSoftware.Com

The MyGSM is a program for access to functions of gsm mobile phone.

Other software in this category

VisualICE Report Utility 4.7 VisualICE Report Utility 4.7
Visualize Software

VisualICE Report Utility - so what do you do if you would like to know more about what the hacker tried to do, who he is, where he`s from or how to report him to the proper authorities? That`s where VisualICE Report Utility comes in.

Gopher Smoker .06 Gopher Smoker .06
PivX Sollutions, LLC

PivX Solutions, LLC released a program appropriately named `Gopher Smoker`.

Bouncer for Windows 1.0 RC6 Bouncer for Windows 1.0 RC6
Chris Mason

Bouncer is a network tool which allows you to bypass proxy restrictions and obtain outside connections from an internal LAN.

Slap 1.2.2.0 Slap 1.2.2.0
Security Software

If your like me you run firewall software that tells you when someone tries to access your system.

VisualZone Report Utility 5.7 VisualZone Report Utility 5.7
Visualize Software

VisualZone Report Utility is a report utility and an intrusion analyser for ZoneAlarm and ZoneAlarm Pro.