1.2 Features Overview

AnySecura is built on system management principles and security best practices, comprehensively addressing potential sources of information breaches or leaks. It safeguards enterprise data from unauthorized access, theft, and malicious modification, enabling organizations to plan and manage information security systematically.

Through flexible and robust management, AnySecura standardizes endpoint behavior while maintaining organizational productivity, enhancing overall execution. Administrators can monitor the status of all computers from a single console and perform system security and asset management tasks efficiently.

The main features of AnySecura include:

Application Control

  • Logs application usage.
  • Tracks usage time and percentage for each application.
  • Controls application execution.

Web Browsing Control

  • Logs visited URLs and page titles.
  • Tracks browsing time and percentage.
  • Restricts access to specified websites or pages.

Document Operation Control

  • Records all document operations across different storage devices and types of actions.
  • Logs deletions and modifications in shared directories by other computers.
  • Provides flexible permission settings to control reading, modifying, and deleting documents.
  • Supports backup for important document copy and deletion operations.

Print Control

  • Logs all print tasks.
  • Captures complete print images of documents.
  • Controls printing operations.

Device Control

  • Manages usage of various computer devices.
  • Controls any newly added devices.

Network Control

  • Controls network communications based on client type, network address, and port categories.
  • Detects unauthorized computers on the network and blocks their access.

Network Traffic Control

  • Logs network traffic and generates statistics.
  • Controls traffic according to address and port ranges within specified time periods.

Screen Monitoring

  • Real-time viewing of client screens.
  • Records historical screen activity at variable frequencies depending on the application.
  • Converts historical screen recordings into standard video files for playback.

Email Control

  • Logs email sending/receiving, including full content and attachments.
  • Controls email sending according to policy.

Instant Messaging Control

  • Records chat times, contacts, and message content in popular IM tools.
  • Controls document sharing via IM.
  • Backs up outgoing documents.

Asset Management

  • Automatically scans and records hardware and software assets, tracking changes.
  • Customizes asset attributes and categories for IT and non-IT assets.
  • Scans Microsoft product patch installation, distributing and installing updates automatically.
  • Detects client security vulnerabilities and provides analysis and solutions.
  • Supports automated software deployment, installation, and document distribution.

Remote Maintenance

  • Real-time client monitoring and remote operations.
  • Remote desktop access for assistance.
  • Supports remote file transfer.

Removable Storage Control

  • Logs usage of portable storage devices, sets access permissions, and controls read/write access.
  • Automatically encrypts/decrypts documents on removable devices to prevent unauthorized access.

Risk Statistics and Reports

  • Multi-dimensional analysis of activities including printing, email, removable storage, document operations, application use, web browsing, and instant messaging.
  • Visualizes user behavior trends to identify potential risks.
  • Tiered alert system records incidents and severity when thresholds are exceeded.
  • Automatically generates periodic reports.

Document Cloud Backup

  • Backs up client data to a centralized document server for storage and management.
  • Supports scheduled, triggered, and full-disk backup.
  • Maintains multiple backup versions as needed.

Software Center

  • Administrators can add and manage software.
  • Users can install, upgrade, or uninstall authorized software.

Watermarking and Traceability

  • Supports on-screen watermarks (full-screen or application window only).
  • Supports print watermarks for physical documents.
  • Adds document watermarks automatically or manually for tracking internal and external sharing.

Document Labeling

  • Monitors and labels documents with classification and sensitivity levels.
  • Performs full-disk scans for labeled documents.
  • Controls external transmission based on labels and sensitivity.

Sensitive Content Detection

  • Defines sensitive information using keywords and regex combinations.
  • Supports local and remote scanning, including full-disk scans.
  • Monitors and protects documents containing sensitive content.

Visual Perception

  • Detects attempts to photograph computer screens.
  • Automatically blocks the screen, locks the computer, or alerts administrators when violations occur.
  • Offers flexible unlock methods: automatic unlock when no photography detected, manual click unlock, or facial recognition.
  • Logs screen capture attempts with user and screen details.

Transparent Document Encryption/Decryption

  • Automatically enforces encryption for critical documents.
  • Sets permissions for screenshot, printing, copy/paste, drag-and-drop, and email actions.
  • Implements tiered access permissions based on organizational hierarchy.
  • Audits decryption requests for external sharing.
  • Supports offline and outbound document permission control.
  • Provides encrypted document operation auditing and backup.