SlideShare a Scribd company logo
PowerPro
PowerPro reduces power consumption and increases security

PowerPro helps save energy costs and increases security. Depending on current user activities, the power supply for
computer, monitor, hard drives, USB and other devices is turned off or individually.
Various profiles can be created for different times of the day or week or for different user groups. Exception rules
ensure, for example, that the downloading of large files from the Internet or a presentation runs smoothly and with-
out interruption. If PowerPro recognizes any atypical behavior, such as large data transfers or computer activity at
unusual hours, it will raise an alarm, thus increasing IT security.

YOUR BENEFITS
   Lower energy costs - you will have com-
   pletely paid for the licensing cost within the
   first 9 months
   Increased security - atypical behavior may
   be an indication for an attack from outside
   or unauthorized employee activities
   More user friendly power settings - the
   computer remains active during presenta-
   tions, even when you get into a lengthy
   discussion
   Early warning system - possible computer
   problems can be diagnosed at an early
   stage
   Intelligent data analysis allows conclusions
   about the hardware state, such as on the
   remaining life of a battery

SELECTED FEATURES
    Intelligent management of the computer
    states ‘hibernate’, ‘standby’, etc.
                                                                 Define various profiles and assign them to users and roles..
    Activity-based regulation and control of
    monitors, USB devices, hard drives, fans,
    CPU, etc.                                                          computer state, active programs or network
    Alarm system is triggered by suspicious                            activities
    activities                                                         Scheduler with several adjustable actions
    Flexible and individual definition of idle                         Savings calculator in Dollars, kWh and CO2
    time based on a variety of criteria                                emissions for the entire company, OU, group
    Intelligent exemption rules – based on the                         or user




 High Savings Potential                                            Green IT protects environment and wallet
 Various studies have estimated the savings                        Environmentally friendly use of information
 potential per computer at about $30. this                         technology is an important contribution to
 means that PowerPro not only fully pays for                       environmental protection. Besides the positive
 itself in the first year, it already saves you                    effects of environmental action for your com-
 money. By using less electricity, you also pro-                   pany with regard to image and social commit-
 tecting the environment.                                          ment, there are also significant cost elements
                                                                   that drive Green IT projects.
cynapspro                                                           Endpoint Data Protection

cynapspro develops software solutions for reliable
endpoint data protection in the enterprise network
and covers the following areas:
DevicePro prevents data loss through open ports and
external storage devices.
CryptionPro encrypts and protects your company
data on mobile storage media – fully automated.
CryptionPro HDD protects your company data by en-
crypting the hard drive.
ApplicationPro blocks unwanted applications and
prevents the use of unlicensed software.
ErasePro ensures that deleted files are not recover-
able.
PowerPro cuts energy costs and reports suspicious
activity.

The following features distinguish all cynapspro                    pected data abuse or loss, cynapspro knows which
solutions:                                                          files have been accessed, by whom and when.

Intuitive Management Console                                        Minimal System Requirements
The single user-friendly Management Console is                      Apart from a SQL database (the free MSDE or SQL
largely self-explanatory and only a minimum of train-               Server 2005 Express edition are fully sufficient), there
ing is required. The clear and concise structure allows             is no additional software required, such as the IIS
the compilation of complex setting with just a few                  Server or .NET client. Consequently, no new vulner-
mouse clicks.                                                       abilities are introduced by installing additional back
                                                                    office software and memory and CPU utilization is
Real-Time Management                                                minimal.
All changes to access permissions will be immediately
pushed out to the clients and stored in the cynapspro               Secure Kernel Driver Technology
database. Users don’t need to restart their machines                The secure cynapspro® kernel driver technology is
or even connect to the company network in order to                  loaded into the operating system during the boot
upgrade their usage rights.                                         sequence and thus ensures that the service running
                                                                    on the client is not visible to the end user. It can only
Rights Management at Group Level, User Level or                     be stopped or uninstalled by an authorized Adminis-
Computer Level                                                      trator.
Reduce your administrative effort. Manage individual
access rights directly with the respective users,                   Integration with Third Party Applications
groups or computers.                                                An XML interface allows the allocation of access per-
                                                                    missions from an existing customer Helpdesk or Ser-
Synchronization of User Directories                                 vice Desk implementation in a fully automated way,
Existing users and user group definitions from Micro-               leveraging existing processes, approval workflows,
soft Active Directory or Novell eDirectory are im-                  notifications and management reports. There will be
ported by the cynapspro server thus reducing the                    no need for service desk workers to use an additional
workload for defining user groups for Access Client                 console.
Lists (ACLs) as well as the sources of error.
                                                                    Distributed Environments
Full Audit Log                                                      Several mutually replicating cynapspro servers pro-
Password-protected, detailed access statistics with                 vide load balancing capabilities in enterprise environ-
filter and sort order functionality. In case of sus-                ments.

Free Trial Version                                                  Contact
On the cynapspro website, we offer a full version                   cynapspro GmbH
of our software for download, including a free 5-                   Am Hardtwald 1
user license.                                                       D-76275 Ettlingen
Please contact us if you are interested in testing                  Tel.: +49 7243 / 945-250
our software in a larger environment.                               Email: contact@cynapspro.com
                                                                    Internet: www.cynapspro.com

                                March 2010 - Copyright cynapspro GmbH 2010—All rights reserved.

More Related Content

What's hot

IT system and network administrator
IT system and network administratorIT system and network administrator
IT system and network administrator
Muhammad Nasir ( MCSA/ MCTS / MCITP)
 
Resume l
Resume lResume l
Wizard intro
Wizard introWizard intro
Wizard intro
shanmuka sreenivas
 
Core R1 Presentation7
Core R1 Presentation7Core R1 Presentation7
Core R1 Presentation7
malcolm shiel
 
Ldc
LdcLdc
IRJET- A Review on Aluminium (LM 25) Reinforced with Boron Carbide (B4C) & Tu...
IRJET- A Review on Aluminium (LM 25) Reinforced with Boron Carbide (B4C) & Tu...IRJET- A Review on Aluminium (LM 25) Reinforced with Boron Carbide (B4C) & Tu...
IRJET- A Review on Aluminium (LM 25) Reinforced with Boron Carbide (B4C) & Tu...
IRJET Journal
 
Dell EqualLogic Case Study: VAA
Dell EqualLogic Case Study: VAADell EqualLogic Case Study: VAA
Dell EqualLogic Case Study: VAA
ibogachev
 
White Paper: Monitoring EMC Greenplum DCA with Nagios - EMC Greenplum Data Co...
White Paper: Monitoring EMC Greenplum DCA with Nagios - EMC Greenplum Data Co...White Paper: Monitoring EMC Greenplum DCA with Nagios - EMC Greenplum Data Co...
White Paper: Monitoring EMC Greenplum DCA with Nagios - EMC Greenplum Data Co...
EMC
 
System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 Overview
Amit Gatenyo
 
Sentri Webinar: Windows Azure Overview
Sentri Webinar: Windows Azure Overview Sentri Webinar: Windows Azure Overview
Sentri Webinar: Windows Azure Overview
Sentri
 
SystemCenter webinar 12 6 12
SystemCenter webinar 12 6 12SystemCenter webinar 12 6 12
SystemCenter webinar 12 6 12
Sentri
 
Managing a virtual datacenter with System Center
Managing a virtual datacenter with System CenterManaging a virtual datacenter with System Center
Managing a virtual datacenter with System Center
Amit Gatenyo
 
Suresh D
Suresh DSuresh D
Network Monitoring
Network MonitoringNetwork Monitoring
Network Monitoring
OpExpert Connect
 
TUCI Desktop Support Responsibilities and Duties
TUCI Desktop Support Responsibilities and DutiesTUCI Desktop Support Responsibilities and Duties
TUCI Desktop Support Responsibilities and Duties
Wilson (Wei) Shao
 
Microsoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 InstallationMicrosoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 Installation
Shahab Al Yamin Chawdhury
 
Resume_ejaz dt. 2.2.15
Resume_ejaz dt. 2.2.15Resume_ejaz dt. 2.2.15
Resume_ejaz dt. 2.2.15
Ejaz Ahmad
 
Sccm 2012
Sccm 2012Sccm 2012
Sccm 2012
ebuc
 
Backup Exec 15 Tuning and Performance Guide
Backup Exec 15 Tuning and Performance GuideBackup Exec 15 Tuning and Performance Guide
Backup Exec 15 Tuning and Performance Guide
Symantec
 

What's hot (19)

IT system and network administrator
IT system and network administratorIT system and network administrator
IT system and network administrator
 
Resume l
Resume lResume l
Resume l
 
Wizard intro
Wizard introWizard intro
Wizard intro
 
Core R1 Presentation7
Core R1 Presentation7Core R1 Presentation7
Core R1 Presentation7
 
Ldc
LdcLdc
Ldc
 
IRJET- A Review on Aluminium (LM 25) Reinforced with Boron Carbide (B4C) & Tu...
IRJET- A Review on Aluminium (LM 25) Reinforced with Boron Carbide (B4C) & Tu...IRJET- A Review on Aluminium (LM 25) Reinforced with Boron Carbide (B4C) & Tu...
IRJET- A Review on Aluminium (LM 25) Reinforced with Boron Carbide (B4C) & Tu...
 
Dell EqualLogic Case Study: VAA
Dell EqualLogic Case Study: VAADell EqualLogic Case Study: VAA
Dell EqualLogic Case Study: VAA
 
White Paper: Monitoring EMC Greenplum DCA with Nagios - EMC Greenplum Data Co...
White Paper: Monitoring EMC Greenplum DCA with Nagios - EMC Greenplum Data Co...White Paper: Monitoring EMC Greenplum DCA with Nagios - EMC Greenplum Data Co...
White Paper: Monitoring EMC Greenplum DCA with Nagios - EMC Greenplum Data Co...
 
System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 Overview
 
Sentri Webinar: Windows Azure Overview
Sentri Webinar: Windows Azure Overview Sentri Webinar: Windows Azure Overview
Sentri Webinar: Windows Azure Overview
 
SystemCenter webinar 12 6 12
SystemCenter webinar 12 6 12SystemCenter webinar 12 6 12
SystemCenter webinar 12 6 12
 
Managing a virtual datacenter with System Center
Managing a virtual datacenter with System CenterManaging a virtual datacenter with System Center
Managing a virtual datacenter with System Center
 
Suresh D
Suresh DSuresh D
Suresh D
 
Network Monitoring
Network MonitoringNetwork Monitoring
Network Monitoring
 
TUCI Desktop Support Responsibilities and Duties
TUCI Desktop Support Responsibilities and DutiesTUCI Desktop Support Responsibilities and Duties
TUCI Desktop Support Responsibilities and Duties
 
Microsoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 InstallationMicrosoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 Installation
 
Resume_ejaz dt. 2.2.15
Resume_ejaz dt. 2.2.15Resume_ejaz dt. 2.2.15
Resume_ejaz dt. 2.2.15
 
Sccm 2012
Sccm 2012Sccm 2012
Sccm 2012
 
Backup Exec 15 Tuning and Performance Guide
Backup Exec 15 Tuning and Performance GuideBackup Exec 15 Tuning and Performance Guide
Backup Exec 15 Tuning and Performance Guide
 

Viewers also liked

Diapositiva 2
Diapositiva 2Diapositiva 2
Diapositiva 2
Asornoza
 
Publicacion de contenidos web
Publicacion de contenidos webPublicacion de contenidos web
Publicacion de contenidos web
CrisCris21
 
Blogs
BlogsBlogs
Blogs
alexmst
 
manual nº 04
manual nº 04manual nº 04
SOA y Gestion por Procesos
SOA y Gestion por ProcesosSOA y Gestion por Procesos
SOA y Gestion por Procesos
Ferran Garcia Pagans
 
Tabla access
Tabla accessTabla access
Tabla access
Karix Carito
 
Las tic en el desarrollo de las competencias lectoras
Las tic en el desarrollo de las competencias lectorasLas tic en el desarrollo de las competencias lectoras
Las tic en el desarrollo de las competencias lectoras
deliamendezp
 
Cynapspro Endpoint Data Protection 2011 - Step By Step Anleitung DevicePro un...
Cynapspro Endpoint Data Protection 2011 - Step By Step Anleitung DevicePro un...Cynapspro Endpoint Data Protection 2011 - Step By Step Anleitung DevicePro un...
Cynapspro Endpoint Data Protection 2011 - Step By Step Anleitung DevicePro un...
cynapspro GmbH
 
Clase2
Clase2Clase2

Viewers also liked (9)

Diapositiva 2
Diapositiva 2Diapositiva 2
Diapositiva 2
 
Publicacion de contenidos web
Publicacion de contenidos webPublicacion de contenidos web
Publicacion de contenidos web
 
Blogs
BlogsBlogs
Blogs
 
manual nº 04
manual nº 04manual nº 04
manual nº 04
 
SOA y Gestion por Procesos
SOA y Gestion por ProcesosSOA y Gestion por Procesos
SOA y Gestion por Procesos
 
Tabla access
Tabla accessTabla access
Tabla access
 
Las tic en el desarrollo de las competencias lectoras
Las tic en el desarrollo de las competencias lectorasLas tic en el desarrollo de las competencias lectoras
Las tic en el desarrollo de las competencias lectoras
 
Cynapspro Endpoint Data Protection 2011 - Step By Step Anleitung DevicePro un...
Cynapspro Endpoint Data Protection 2011 - Step By Step Anleitung DevicePro un...Cynapspro Endpoint Data Protection 2011 - Step By Step Anleitung DevicePro un...
Cynapspro Endpoint Data Protection 2011 - Step By Step Anleitung DevicePro un...
 
Clase2
Clase2Clase2
Clase2
 

Similar to PowerPro Flyer English

ApplicationPro Flyer English
ApplicationPro Flyer EnglishApplicationPro Flyer English
ApplicationPro Flyer English
cynapspro GmbH
 
DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer English
cynapspro GmbH
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer English
cynapspro GmbH
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA software
Trihedral
 
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
Agaram Technologies
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
GE코리아
 
Icomm agentless-architecture
Icomm agentless-architectureIcomm agentless-architecture
Icomm agentless-architecture
Icomm Technologies
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
NCS Computech Ltd.
 
IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)
Kimber Spradlin
 
unit5final
unit5finalunit5final
unit5final
Jonathan Paxtor
 
Cloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium BusinessesCloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium Businesses
Al Sabawi
 
Projects, Roles & Responsibilities
Projects, Roles & ResponsibilitiesProjects, Roles & Responsibilities
Projects, Roles & Responsibilities
Saud Nazeer
 
cloud computing, touch screen, dms and cores
cloud computing, touch screen, dms and corescloud computing, touch screen, dms and cores
cloud computing, touch screen, dms and cores
Wajiha Muhammad Ismail
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
Quest
 
StoreGrid : Introduction & Features
StoreGrid : Introduction & FeaturesStoreGrid : Introduction & Features
StoreGrid : Introduction & Features
Revolucion
 
Voyss Cloud-Based Managed Services Webinar 9-14-12
 Voyss Cloud-Based Managed Services Webinar 9-14-12 Voyss Cloud-Based Managed Services Webinar 9-14-12
Voyss Cloud-Based Managed Services Webinar 9-14-12
mjamesvoyss
 
Lanlogic IT White Paper
Lanlogic IT White PaperLanlogic IT White Paper
Lanlogic IT White Paper
ZAG Technical Services
 
EACS Cloud Backup
EACS Cloud BackupEACS Cloud Backup
EACS Cloud Backup
iantaylor2100
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application Virtualization
Amit Gatenyo
 
Re-Imagining the Data Center with Intel
Re-Imagining the Data Center with IntelRe-Imagining the Data Center with Intel
Re-Imagining the Data Center with Intel
Intel IT Center
 

Similar to PowerPro Flyer English (20)

ApplicationPro Flyer English
ApplicationPro Flyer EnglishApplicationPro Flyer English
ApplicationPro Flyer English
 
DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer English
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer English
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA software
 
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Icomm agentless-architecture
Icomm agentless-architectureIcomm agentless-architecture
Icomm agentless-architecture
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
 
IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)
 
unit5final
unit5finalunit5final
unit5final
 
Cloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium BusinessesCloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium Businesses
 
Projects, Roles & Responsibilities
Projects, Roles & ResponsibilitiesProjects, Roles & Responsibilities
Projects, Roles & Responsibilities
 
cloud computing, touch screen, dms and cores
cloud computing, touch screen, dms and corescloud computing, touch screen, dms and cores
cloud computing, touch screen, dms and cores
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
 
StoreGrid : Introduction & Features
StoreGrid : Introduction & FeaturesStoreGrid : Introduction & Features
StoreGrid : Introduction & Features
 
Voyss Cloud-Based Managed Services Webinar 9-14-12
 Voyss Cloud-Based Managed Services Webinar 9-14-12 Voyss Cloud-Based Managed Services Webinar 9-14-12
Voyss Cloud-Based Managed Services Webinar 9-14-12
 
Lanlogic IT White Paper
Lanlogic IT White PaperLanlogic IT White Paper
Lanlogic IT White Paper
 
EACS Cloud Backup
EACS Cloud BackupEACS Cloud Backup
EACS Cloud Backup
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application Virtualization
 
Re-Imagining the Data Center with Intel
Re-Imagining the Data Center with IntelRe-Imagining the Data Center with Intel
Re-Imagining the Data Center with Intel
 

More from cynapspro GmbH

Cynapspro endpoint data protection 2011 step by-step anleitung device pro und...
Cynapspro endpoint data protection 2011 step by-step anleitung device pro und...Cynapspro endpoint data protection 2011 step by-step anleitung device pro und...
Cynapspro endpoint data protection 2011 step by-step anleitung device pro und...
cynapspro GmbH
 
cynapspro endpoint data protection 2010 - technical specifications
cynapspro endpoint data protection 2010 - technical specificationscynapspro endpoint data protection 2010 - technical specifications
cynapspro endpoint data protection 2010 - technical specifications
cynapspro GmbH
 
cynapspro endpoint data protection - user guide
cynapspro endpoint data protection -  user guidecynapspro endpoint data protection -  user guide
cynapspro endpoint data protection - user guide
cynapspro GmbH
 
cynapspro endpoint data protection - installation guide
cynapspro endpoint data protection - installation guidecynapspro endpoint data protection - installation guide
cynapspro endpoint data protection - installation guide
cynapspro GmbH
 
cynapspro endpoint data protection 2010 - Bedienungsleitfaden
cynapspro endpoint data protection 2010 - Bedienungsleitfadencynapspro endpoint data protection 2010 - Bedienungsleitfaden
cynapspro endpoint data protection 2010 - Bedienungsleitfaden
cynapspro GmbH
 
Cynapspro data endpoint protection - Anbindung von Drittsysteme
Cynapspro data endpoint protection - Anbindung von DrittsystemeCynapspro data endpoint protection - Anbindung von Drittsysteme
Cynapspro data endpoint protection - Anbindung von Drittsysteme
cynapspro GmbH
 
cynapspro data endpoint protection 2010 - Installationsleitfaden
cynapspro data endpoint protection 2010 - Installationsleitfadencynapspro data endpoint protection 2010 - Installationsleitfaden
cynapspro data endpoint protection 2010 - Installationsleitfaden
cynapspro GmbH
 
CryptionPro HDD Flyer deutsch
CryptionPro HDD Flyer deutschCryptionPro HDD Flyer deutsch
CryptionPro HDD Flyer deutsch
cynapspro GmbH
 
DevicePro Flyer deutsch
DevicePro Flyer deutschDevicePro Flyer deutsch
DevicePro Flyer deutsch
cynapspro GmbH
 
CryptionPro HDD Flyer deutsch
CryptionPro HDD Flyer deutschCryptionPro HDD Flyer deutsch
CryptionPro HDD Flyer deutsch
cynapspro GmbH
 
PowerPro Flyer deutsch
PowerPro Flyer deutschPowerPro Flyer deutsch
PowerPro Flyer deutsch
cynapspro GmbH
 
ErasePro Flyer deutsch
ErasePro Flyer deutschErasePro Flyer deutsch
ErasePro Flyer deutsch
cynapspro GmbH
 
ApplicationPro Flyer deutsch
ApplicationPro Flyer deutschApplicationPro Flyer deutsch
ApplicationPro Flyer deutsch
cynapspro GmbH
 
Screenshots von DevicePro 2009
Screenshots von DevicePro 2009Screenshots von DevicePro 2009
Screenshots von DevicePro 2009
cynapspro GmbH
 
Screenshots von DevicePro 2009
Screenshots von DevicePro 2009Screenshots von DevicePro 2009
Screenshots von DevicePro 2009
cynapspro GmbH
 
DevicePro Ultimate 2009 - Efficient Data Loss Prevention Solution
DevicePro Ultimate 2009 - Efficient Data Loss Prevention SolutionDevicePro Ultimate 2009 - Efficient Data Loss Prevention Solution
DevicePro Ultimate 2009 - Efficient Data Loss Prevention Solution
cynapspro GmbH
 
DevicePro Ultimate 2009 - Die Loesung - Ihre Vorteile - Das Unternehmen
DevicePro Ultimate 2009 - Die Loesung - Ihre Vorteile - Das UnternehmenDevicePro Ultimate 2009 - Die Loesung - Ihre Vorteile - Das Unternehmen
DevicePro Ultimate 2009 - Die Loesung - Ihre Vorteile - Das Unternehmen
cynapspro GmbH
 

More from cynapspro GmbH (18)

Cynapspro endpoint data protection 2011 step by-step anleitung device pro und...
Cynapspro endpoint data protection 2011 step by-step anleitung device pro und...Cynapspro endpoint data protection 2011 step by-step anleitung device pro und...
Cynapspro endpoint data protection 2011 step by-step anleitung device pro und...
 
cynapspro endpoint data protection 2010 - technical specifications
cynapspro endpoint data protection 2010 - technical specificationscynapspro endpoint data protection 2010 - technical specifications
cynapspro endpoint data protection 2010 - technical specifications
 
cynapspro endpoint data protection - user guide
cynapspro endpoint data protection -  user guidecynapspro endpoint data protection -  user guide
cynapspro endpoint data protection - user guide
 
cynapspro endpoint data protection - installation guide
cynapspro endpoint data protection - installation guidecynapspro endpoint data protection - installation guide
cynapspro endpoint data protection - installation guide
 
cynapspro endpoint data protection 2010 - Bedienungsleitfaden
cynapspro endpoint data protection 2010 - Bedienungsleitfadencynapspro endpoint data protection 2010 - Bedienungsleitfaden
cynapspro endpoint data protection 2010 - Bedienungsleitfaden
 
Cynapspro data endpoint protection - Anbindung von Drittsysteme
Cynapspro data endpoint protection - Anbindung von DrittsystemeCynapspro data endpoint protection - Anbindung von Drittsysteme
Cynapspro data endpoint protection - Anbindung von Drittsysteme
 
cynapspro data endpoint protection 2010 - Installationsleitfaden
cynapspro data endpoint protection 2010 - Installationsleitfadencynapspro data endpoint protection 2010 - Installationsleitfaden
cynapspro data endpoint protection 2010 - Installationsleitfaden
 
CryptionPro HDD Flyer deutsch
CryptionPro HDD Flyer deutschCryptionPro HDD Flyer deutsch
CryptionPro HDD Flyer deutsch
 
DevicePro Flyer deutsch
DevicePro Flyer deutschDevicePro Flyer deutsch
DevicePro Flyer deutsch
 
CryptionPro HDD Flyer deutsch
CryptionPro HDD Flyer deutschCryptionPro HDD Flyer deutsch
CryptionPro HDD Flyer deutsch
 
PowerPro Flyer deutsch
PowerPro Flyer deutschPowerPro Flyer deutsch
PowerPro Flyer deutsch
 
ErasePro Flyer deutsch
ErasePro Flyer deutschErasePro Flyer deutsch
ErasePro Flyer deutsch
 
Cryption proflyer de
Cryption proflyer deCryption proflyer de
Cryption proflyer de
 
ApplicationPro Flyer deutsch
ApplicationPro Flyer deutschApplicationPro Flyer deutsch
ApplicationPro Flyer deutsch
 
Screenshots von DevicePro 2009
Screenshots von DevicePro 2009Screenshots von DevicePro 2009
Screenshots von DevicePro 2009
 
Screenshots von DevicePro 2009
Screenshots von DevicePro 2009Screenshots von DevicePro 2009
Screenshots von DevicePro 2009
 
DevicePro Ultimate 2009 - Efficient Data Loss Prevention Solution
DevicePro Ultimate 2009 - Efficient Data Loss Prevention SolutionDevicePro Ultimate 2009 - Efficient Data Loss Prevention Solution
DevicePro Ultimate 2009 - Efficient Data Loss Prevention Solution
 
DevicePro Ultimate 2009 - Die Loesung - Ihre Vorteile - Das Unternehmen
DevicePro Ultimate 2009 - Die Loesung - Ihre Vorteile - Das UnternehmenDevicePro Ultimate 2009 - Die Loesung - Ihre Vorteile - Das Unternehmen
DevicePro Ultimate 2009 - Die Loesung - Ihre Vorteile - Das Unternehmen
 

Recently uploaded

20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

PowerPro Flyer English

  • 1. PowerPro PowerPro reduces power consumption and increases security PowerPro helps save energy costs and increases security. Depending on current user activities, the power supply for computer, monitor, hard drives, USB and other devices is turned off or individually. Various profiles can be created for different times of the day or week or for different user groups. Exception rules ensure, for example, that the downloading of large files from the Internet or a presentation runs smoothly and with- out interruption. If PowerPro recognizes any atypical behavior, such as large data transfers or computer activity at unusual hours, it will raise an alarm, thus increasing IT security. YOUR BENEFITS Lower energy costs - you will have com- pletely paid for the licensing cost within the first 9 months Increased security - atypical behavior may be an indication for an attack from outside or unauthorized employee activities More user friendly power settings - the computer remains active during presenta- tions, even when you get into a lengthy discussion Early warning system - possible computer problems can be diagnosed at an early stage Intelligent data analysis allows conclusions about the hardware state, such as on the remaining life of a battery SELECTED FEATURES Intelligent management of the computer states ‘hibernate’, ‘standby’, etc. Define various profiles and assign them to users and roles.. Activity-based regulation and control of monitors, USB devices, hard drives, fans, CPU, etc. computer state, active programs or network Alarm system is triggered by suspicious activities activities Scheduler with several adjustable actions Flexible and individual definition of idle Savings calculator in Dollars, kWh and CO2 time based on a variety of criteria emissions for the entire company, OU, group Intelligent exemption rules – based on the or user High Savings Potential Green IT protects environment and wallet Various studies have estimated the savings Environmentally friendly use of information potential per computer at about $30. this technology is an important contribution to means that PowerPro not only fully pays for environmental protection. Besides the positive itself in the first year, it already saves you effects of environmental action for your com- money. By using less electricity, you also pro- pany with regard to image and social commit- tecting the environment. ment, there are also significant cost elements that drive Green IT projects.
  • 2. cynapspro Endpoint Data Protection cynapspro develops software solutions for reliable endpoint data protection in the enterprise network and covers the following areas: DevicePro prevents data loss through open ports and external storage devices. CryptionPro encrypts and protects your company data on mobile storage media – fully automated. CryptionPro HDD protects your company data by en- crypting the hard drive. ApplicationPro blocks unwanted applications and prevents the use of unlicensed software. ErasePro ensures that deleted files are not recover- able. PowerPro cuts energy costs and reports suspicious activity. The following features distinguish all cynapspro pected data abuse or loss, cynapspro knows which solutions: files have been accessed, by whom and when. Intuitive Management Console Minimal System Requirements The single user-friendly Management Console is Apart from a SQL database (the free MSDE or SQL largely self-explanatory and only a minimum of train- Server 2005 Express edition are fully sufficient), there ing is required. The clear and concise structure allows is no additional software required, such as the IIS the compilation of complex setting with just a few Server or .NET client. Consequently, no new vulner- mouse clicks. abilities are introduced by installing additional back office software and memory and CPU utilization is Real-Time Management minimal. All changes to access permissions will be immediately pushed out to the clients and stored in the cynapspro Secure Kernel Driver Technology database. Users don’t need to restart their machines The secure cynapspro® kernel driver technology is or even connect to the company network in order to loaded into the operating system during the boot upgrade their usage rights. sequence and thus ensures that the service running on the client is not visible to the end user. It can only Rights Management at Group Level, User Level or be stopped or uninstalled by an authorized Adminis- Computer Level trator. Reduce your administrative effort. Manage individual access rights directly with the respective users, Integration with Third Party Applications groups or computers. An XML interface allows the allocation of access per- missions from an existing customer Helpdesk or Ser- Synchronization of User Directories vice Desk implementation in a fully automated way, Existing users and user group definitions from Micro- leveraging existing processes, approval workflows, soft Active Directory or Novell eDirectory are im- notifications and management reports. There will be ported by the cynapspro server thus reducing the no need for service desk workers to use an additional workload for defining user groups for Access Client console. Lists (ACLs) as well as the sources of error. Distributed Environments Full Audit Log Several mutually replicating cynapspro servers pro- Password-protected, detailed access statistics with vide load balancing capabilities in enterprise environ- filter and sort order functionality. In case of sus- ments. Free Trial Version Contact On the cynapspro website, we offer a full version cynapspro GmbH of our software for download, including a free 5- Am Hardtwald 1 user license. D-76275 Ettlingen Please contact us if you are interested in testing Tel.: +49 7243 / 945-250 our software in a larger environment. Email: contact@cynapspro.com Internet: www.cynapspro.com March 2010 - Copyright cynapspro GmbH 2010—All rights reserved.