2. We are pleased to introduce our company MNTech Enterprises Private Ltd, a leading
software company with its Corporate office in Zirakpur, Mohali and branches at
Noida, Chandigarh, Baddi and is offering software development and professional
services that works with Enterprise systems and companies.
As a privately owned company, MNTech provides IT consultancy,
Software design and Development as well as professional
services, hardware deployment and maintenance.
Our Company is ISO 9001; ISO 2001;ISO 2005 certified and is
registered with NASSCOM, DIPP,DISC, STPI
4. WebHawk prevents your system from
Trojans & dangerous malware from
getting in and out of your computer
systems and going through your
corporate data. Webhawk secures
you from inside to outside and
also outside to inside Threats.
WebHawk® secures your system from Hackers and
other Internal and External internet threats,
better, faster, cheaper and easier than any other
solution.
5. URL Filtering
USB Blocking
RansomWare Protection
Real Time Visibility
Anti –Spamming
Centralized monitoring and reporting
Screenshots
Group Management
System Monitoring
6. Restrict Wi-Fi
Installed Apps
File/Folders Permission
Add and Delete Local Users
Wallpaper Change Permission
Check Windows update
View running Services
USB Enable disable
Allow and disallow Applications
7.
8. URL CONTENT FILTERING
URL Content Filtering restrict access to wide variety
of categories including; pornography, illegal sites,
drugs related and even sometimes social-networking
sites.
URL Filtering uses Categorize Websites on the
internet and either allow/block the access to them
based on a Policies , Groups or individual setting.
WebHawk® let you block any access to web pages that
you would not want your employees to access by blocking the
category or individual page.
9. Server Admin can block the usage of USB on clients system as use in an
organization sometime leads to the Spreading virus and malware from one
system to another system. This will help you to instantly block USB and
safeguard your system from these viruses. It will block only USB storage
devices like USB Sticks and portable disk
However normal USB devices like –Wireless keyboard, mouse , internet
dongles, Bluetooth will work without any problem.
Prevent Data leaks by
Restricting external
devices and ports .
10. Ransomware is a type of Malicious Software or Malware, designed to deny access to a
computer system or data until a Ransom is paid. Ransomware is a malware that locks your
computer or encrypts your files and demands a Ransom (Money) in exchange. There's no
guarantee that you'll get your data back even after you pay the Ransom.
There are a number of vectors Ransomware can take to access a computer. One of the most
common delivery systems is spamming — attachments that come to the victim in an email ,
dissemble as a file they should trust .Once they're downloaded and opened, they can take over
the victim's computer and that trick users into allowing administrative access. If you are using
Webhawk then it will prevent you from these and with its Anti-spamming your data will safe
from this kind of phishing emails and users . Webhawk also block your domains with mail
blocking so that your users will only have limited mail domain access.
11. WebHawk®
That means having real-time knowledge
of:
Every piece of information that is transmitted to,
from, and within the organizational network.
Every byte of data that is stored on-site as well as in
remote data centers (or cloud servers).
All the applications that run on and interact with
these devices.
The source and destination (URLs, email IDs, etc.) of
every inbound and outbound communication.
12. WEBHAWK Spam Blocker provides the advanced security your organization needs with real-
time, continuous and highly reliable protection from Spam and Phishing attempts. It is
commonly used as dangerous phishing attempts to maliciously obtain sensitive information,
including credit card numbers, passwords, usernames, and other personal and company
information.
WebHawk® Spam Blocker works on both SMTP and POP3 email protocols and provides the
advanced security your organization needs to protection itself from spam and phishing
attempts.
Blocks nearly 100%
of Unwanted and
Dangerous Emails WebHawk
13.
14. With WebHawk® Admin can manage Groups
of different different departments like HR , IT
Support, Sales , Process Managers etc. You
also have instant view the WEBHAWK
Dashboard .
Admin setup the Policies and Activities of their
users by Groups and also admin can add new
groups when required .
15. WebHawk® provides Real
Time Network Traffic Scanning,
Monitoring and Controlling as
well as keeping track of the
performance of your systems.
Monitors all the internal users
Applies rules configured for your users
Analyses data passing through your
Network
Manages bandwidth usage
Allows/Blocks URLs for users
VPN details for any specific user
WebHawk® provides Monitoring
Reports to keep your Network
Secure.
17. System Management describes the ability for
administrators to manage user access to various
resources like systems, devices, applications,
storage systems, networks. System
management enables admins to control user
access.
System Users Password Reset
Users Switch enables or disable
System User Login enable or disable
Sign in User Hide/show
System Management
18. System Users Password Reset
Admin can give the access to users to reset their
password. Admin has this authority to reset the
password for any users. Admin manage the
system for their users.
System User Login enable or disable
Admin can view the list of the users which are
logged in and working on the system. This is
helpful for admin to control or manage the users.
19. Users Switch enables or disable - It allows users to switch between user
accounts on a single system without quitting applications and logging out. Admin can
give the access to their users for “User Switch”. If “User Switch “ is enable then it
allows users to switch another user account on the system without closing the current
user’s Programs, folders etc .
Sign in User Hide/show – Admin can setup the “Sign in” policy for users Hide
or Show. When you have too many users that using same system, or you want to keep
your account secret then you use this and you just need to setup this policy. You need
to select hide option from Sign in user also if you want to show the sign in accounts for
any particular users then you can setup “Show” sign in users.
20. Remote Desktop Enable or
Disable:-
It allows users system to take Remote desktop
access from anywhere. Remote Desktop must be
enabled, you must have network access to the
remote computer (this could be through the
Internet), and you must have permission to
connect.
For permission to connect, you must be on
the list of users. Before you start a connection,
it's a good idea to look up the name of the
computer you're connecting to and to make sure
Remote Desktop connections are allowed . You
can use all of your work computer's programs,
files, and network resources from
your computer from another computer.
21. Check Windows Update-
Admin can check the updates of clients system
and also if require admin can update the system of their users.
Admin receive real time notifications for the update of the system
and also apply the patches when the system will be update.
Installed Apps-
In any organization security is priority and productivity is
also necessary .With this admin can check the installed
application of their users. Also view the complete details of the
applications which are installed to their client systems .Admin stay
more informed about department wise working and also have the
log of applications which their employees are using. Admin can
remotely install the software on clients system.
22. View Running Services –
Webhawk admin panel will also help admin to view
the running services on their client users. Admin view
the running services on the system, This will helpful for
admin to keep the records of their users working .
USB Enable or Disable –
Server Admin can block the usage of USB on clients
system as use in an organization sometime leads to the
Spreading virus and malware from one system to
another system. This will help you to instantly block USB
and safeguard your system from these viruses. It will
block only USB storage devices like USB Sticks and
portable disk.
However normal USB devices like –Wireless keyboard,
Mouse, Internet dongles, Bluetooth will work without
any problem. It will Prevent Data leaks by Restricting
external devices and ports.
23. Restrict Wi-Fi –
You can add the Wi-Fi name in this list for restriction.
Restrict Wi-Fi is used to maintain the security of your network and
increase the bandwidth of your network. It's also important to
protect your network from attacks over the internet by keeping
your router secure. For a business, this implies that an employee
can potentially be more productive as his or her work can be
accomplished from any convenient location.
Predefined Applications –
In this predefined applications admin can setup the list of
applications , software’s and if users will try to access these
applications or software’s then these applications and software’s
installed on their system however these applications will not run
on their users system . So the admin can setup the predefined list
of application and software’s.
24. Wallpaper change Permission and
Screenshot capture
Admin can check systems wallpaper and also give the
permission to their users for changing wallpapers. Admin
gives the authority of any users to change wallpaper.
Admin can also capture screenshot of their user’s
system anytime to view the current status .Admin can take
full control of the systems and view the working of their
users and save the records of the users, so that admin will
become more observant of their users and working of
users .
25. For more Info visit our Website -
https://www.getwebhawk.com/
Notas do Editor
WebHawk gives Complete visibility of applications ,content ,users and threats to pro-actively secure network ,increase productivity and performance.