Business Type:
Manufacturer/Factory,Trading Company,Distributor/Wholesaler
Business Range:
Intraoral camera, X-ray inspection, Touch screen POS, Needle destroyer, Laryngoscope
Establishment:
2012
R&D Capacity:
OEM, ODM, Others
Terms of Payment:
LC, T/T, D/P, Paypal, Western Union
Main Markets:
Western Europe, South America, Eastern Europe
OEM/ODM Service
Sample Available

Golden Link Technology Co is a manufacturer for wired, wireless and sd memory intraoral dental cameras, LED dental curing light, Teeth whitening accelerator, Digital x-ray sensor with positioningholde...

1
    YRS
General Supplier

Information Safety

Get Latest Price
Min. Order / Reference FOB Price
1 Unit US $99.00/ Unit
Local Area: Shenzhen, Guangdong, China
R&D Capacity: OEM, ODM, Other
Payment Terms: LC, T/T, D/P, Paypal, Western Union
Brand: Solarcad

AJ-2000 Information network security monitoring and protecting system is a combined hardware and software unit which provides comprehensive security monitoring for personal or small business company online activities including web browsing, online search, emails, and social networks, provide a comprehensive plug and play system eaiser to clients. Monitor, capture, record and block your selection of intranet online activities based on keyword matching to protect information,Personal or Small businesses:
Small businesses especially those involved in finance, medical , software, information property such as accountants, investment agents, and loan agents, R&D centre can use it to protect their confidential data.
Health care providers such as physicians, beauty salon or dentists can protect private patients health data.
Service businesses including insurance agents, real estate agents, law firm, attorneys, and schools can protect confidential clients data.
Major Features
Family Controlsoftware Protects your kids from unsecure online activities and dangerous behaviors in their daily life.
Enterprise Control protects your confidential information from unsecureonline activities to avoid potential data leakage and damage.
1,Cross Internet monitoring
2,Monitoring chat content
3,Accurately record browsing web addresses and headlines
4,Hardware asset management, recording computer hardware information and change records.
5,Check and view the installed software.
6,Remote shutdown, remote shutdown of the controlled computer
7,File operation monitoring, monitoring the operation of controlled computer files.
8,Screen interception, intelligent screenshots, timing screenshots
9,Disable USB storage device, disable U disk, Usb mobile hard disk and CD driver.
10,Disable USB network card and portable WiFi
11,Monitor the computer screen
12,View / end the software to view / end the software running on the managed computer
13,Prohibit software operation
14,Send a message to send the pop-up information to the managed computer.
15,Monitoring chat content
16,Prohibit modifying the network card IP and MAC (NIC address).
17,Six deployment modes: APP Super Gateway, ARP Gateway, Bridge Mode, Pure Plug-in Mode, Single NIC Gateway, Double NIC Gateway
18,Management open ARP firewall computer
19,Cross network segment (VLAN) management to support VLAN multi network segment management
20,Monitoring websites, prohibiting and monitoring access to nameedweb pages, website URL classification filtering
21,Browse the page list filtering, you can access only the white list of sites, prohibit access to the blacklist of sites
22,Blocking chat software, other chat software
23,Blocking online games, and other online games
24,Blocked stock software, and other stock speculation software
25,Blocked all network video, and other network videos
26,Plugging all network TV, blocking network televisions
27,Plugging all Internet telephones
28,Plugging all network streaming media and plugging all streaming video with embedded web pages
29,Plugging all HTTP/FTP downloads and plugging all HTTP/FTP Downloads
30,Plugging all BT downloads to block all software downloaded using BT protocol
31,Plugging all the donkey downloads and plugging all software downloaded by eMule protocol
32,Blocking web mail, blocking etc.
33,Plugging client mail, plugging FoxMail, Outlook and other client mail
34,Blocking Internet proxy software
35,Intelligent allocation of Internet bandwidth, so that the rational use of bandwidth.
36,Internet bandwidth is precisely controlled to accurately control the download / upload bandwidth of a computer.
37,Internet traffic management limits the total flow of a computer to the Internet one day.
38,Download control accurately.
39,Preventing random changes of IP and MAC.
40,Computer attack alarm, alarm ARP attacks in LAN.
41,Policy time setting can set different strategies according to the time period.
42,Automatically discover the computer and start management.
43,Boot automatically run and start management
44,Custom management rules, you can customize IP, and port plugging ,Log query, log before querying
45,Forcing computer to break network
46,Monitoring and records the online behavior of the managed computer.
47,Regular shutdown of the monitoring machine, and computer motherboard in conjunction with regular start-up before work automatic management, automatic shutdown after work disconnection
48,Integrated remote assistance, software integrated remote assistance, remote assistance to solve user's software usage problems
Hardware configuration:
Intel Core I5 processor
4GB DDR3 1600 memory
128GB mSATA SSD
1T- Ethernet Port
15" touch screen monitor
metal computer standing base
Windows server operation
Solarcad information safety monitoring software for intranet use
If you want to add firewall to protect external attack please inquire

Send your message to this supplier

*From:
To:
Shenzhen AJ Technology Co., Ltd
*Message:

Enter between 10 to 1,000 characters.

*Email code:
This is not what you are looking for? Post a Sourcing Request Now

Find Similar Products By Category

Related Searches

You Might Also Like

Contact Supplier

Mr. Solive Shao
Sales Department
Sales Manager