| 
										 
											  
									 | 
									
										 
											  
											Workstation PolicyShield 
											- 
											Version 
											1.54 
										
											For enterprises that need to preserve the investment, 
availability, and security of IT resources, 
Workstation PolicyShield  is a use-filtering system 
that proactively manages the use of files and 
applications at the endpoint according to company 
policy, while minimizing exposure to rogue files. 
Proven technology detects and manages files 
throughout their use-cycle, with a unique capability 
to prevent unapproved files from installing on the 
network. Files and applications can be detected even 
if disguised. 
Workstation PolicyShield is used to manage of a 
variety of applications and file types including: 
games, music, movies, P2P file-sharing programs, 
instant messengers, hacking tools and user-defined 
files. It also prevents the introduction of spyware 
and Trojan horses. The system can enforce policies 
that prohibit use as well as those that permit 
controlled use. 
Workstation PolicyShield:
-Protects and preserves the investment and 
availability of IT resources by managing file use to 
ensure that it supports company policy and business 
objectives. 
-Reinforces security with real-time detection and 
automated response to inappropriate file use, which 
minimizes exposures from any application or file. 
-Supports HR initiatives by enabling approved 
personal, file use, to support recruiting and 
retention without compromising employee privacy. 
-Maintains productivity by keeping file use within 
approved guidelines, detecting and responding to 
activity that could affect availability. 
-Enhances compliance assurance with thorough 
detection and automated resolution that is invisible 
to the end-user. 
-Speeds policy enforcement with a streamlined 
interface and quick-start configuration that is 
usually up and running in under an hour. 
-Improves IT efficiency with centralized deployment 
and management of remote workstations and servers. 
-Strengthens endpoint security by detecting malware 
as well as borderline application and file activity 
that frequently creates netwo 
										
									 |