![]() An OTP Code can be generated for a specific device, on a specific computer, for a specific user. This has now been extended to users as well, allowing companies more flexibility in the way they manage temporary access rights. Until recently, OTPs could only be generated for specific devices or/and computers. The Offline Temporary Password (OTP) section also got a makeover which facilitates the generation of an OTP Code while providing additional options for its parameters. The next time it will be activated a new OTP Code will be generated, making the previous one invalid. Once it has been used or if there are security concerns raised over it, the password can be revoked. Universal Offline Temporary PasswordĪ new feature added to Endpoint Protector 5.1, the Universal Offline Temporary Password (UOTP) can be used by any user, on any computer, for any device or file transfer, eliminating all security restrictions for one hour. Only those that choose to customize these policies will have access to it. Keep in mind that, if predefined Standard Device Control Policies are active, the new section governing the fallback policies will not appear. Once activated, the rules that govern outside hours can be defined in Global Rights. To activate the outside network option, admins have to check the box for it and then list a Network DNS and Network ID. Working days and hours can be chosen in the Global Settings section of Device Control. What this essentially means is that different access rights can be set if a computer is being used outside business hours or outside the company network. Time and Network based Device Control policiesįrom this point on, admins will have the option to enable time and network based access rights from Device Control. Let’s take a closer look at some of its highlights. ![]() Today, we are happy to introduce our very first update for the 5th version of our flagship product, Endpoint Protector 5.1.0.0. Since then, our development team has been working hard around the clock to boost existing features and add new ones based on user feedback and industry demands. The upgrade underlined our commitment to continuing to provide great Data Loss Prevention solutions that address today’s data security needs and concerns. ![]() Released in May 2017, Endpoint Protector 5 came with a modern intuitive user interface, significant backend enhancements as well as new features and a completely redesigned and improved eDiscovery module. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |