CGP3 Security Solutions empowers Enterprises to address these SECURIY requirements in order to create conducive environment and protect their customers, employees, intellectual property and brand. End-users are also welcome to use the system.
- Remote Asset Tracking
Control is the bedrock of confidence. Ability and reliability of our system to give customers self-healing endpoint security, visibility of devices, data, users and applications, is the ultimate level of control and confidence for the modern enterprise.
- Monitor and track all devices – the basis upon which sound asset management and security policies can be driven – it is cost-effective and extremely accurate tool,
- Remotely wipe data residing on stolen, missing or misplaced devices – ensuring an audit methodology to prove corporate data was successfully deleted,
- Ensure Endpoint Protection security investments and controls are always in place and functioning continually. Validate to regulators, auditors, senior management and board of directors,
- Eliminate human involvement thus saving amount of time and money to conduct daily required inventory control.
- Asset Administration
A Customer Center provides an easy to use and cost effective cloud-based interface to monitor device status and ensure Regulator compliance is maintained.
- Collect incredibly accurate and comprehensive information from each device,
- Create customized policies and alerts to be notified when an unauthorized change is detected
- Software and Asset Management and Reporting (ISAM)
Our agent simplifies management of software licenses, computer lease, machine retirement, upgrades and device ownership by providing easy-to-use web-based reporting tools. These tools are accessed through an intuitive web-based Customer Center. Preconfigured reports come standard, and customer reports are easy to generate. Preconfigured reports help IT staff to manage highly distributed, mobile assets.
The following list the standard reports available – to name a few:
- Installed Software Overview Reports
- Software Configuration Change Report
- Software By Device Report
- Software License Compliance Overview Report
- Microsoft Audit Summary Report
- Software Policy Non-Compliance Report
- Endpoint Forensics
Ability of our clients to understand why and how something happened is critical, especially when proving chain of custody or when criminal activity is suspected. The total Absolute Investigations & Recovery team can:
- Forensically mine a stolen computer regardless of location. Use key captures, registry and file scanning, geolocation, and other investigative techniques to understand how and why a device was breached.
- Determine who has the computer, what they’re doing with it, and whether any data was accessed.
- Endpoint Recovery
In instances where a criminal act has resulted in the theft of a computer or tablet device, a case is reported to the local police – SAPS. An international Absolute Investigations & Recovery team, in alliance with SAPS, will perform an investigation and provide the results to local police to assist in their criminal investigation.
The International Forensic team has participated in 38,000+ successful recoveries, working closely with law enforcement agencies around the world.
- Software Support Training
CGP3 Security Solutions will coordinate or offer to provide training to our clients. Software Training service is your key to a successful implementation by maximizing the applications usability and functionality ensuring a comprehensive knowledge transfer occurs with every training session.
DDS (Device & Data Security) hands-on training experience for our clients can take place online or on-site. All Software training sessions are interactive by design and encourage participation.