User Behavior Monitoring (in development)
Administrators manage and control IT security policies. Individual users and user groups can be assigned specific roles and permissions — including whether, and which, file types a user is allowed to upload to or download from the isolation computer.
The product was developed in compliance with GDPR. With appropriate operational agreements in place, management can be alerted based on configurable thresholds for critical user behavior, attempted misuse, or suspicious activity. For example: which user attempts to upload or download which files, how often, and when.