itWatch products protect against the most advanced forms of attack (APT), hidden attack vectors and data theft.
itWatch products protect against the most advanced forms of attack (APT), hidden attack vectors and data theft. The patented itWatch security solutions with large installations, well over 400,000 licenses, offer many advantages due to their worldwide unique selling propositions - in the area of IT security, GRC and, of course, provable data protection. High demands of intelligence service, military and police are met as well as those of standard office workplaces. Since 1997, the itWatch Enterprise Security Suite protects its customers millions of times in the areas of device, port, application, media, print, content control, security awareness, endpoint security, DLP etc. The IoT/Industry 4.0 market is served by end-to-end security lifecycle solutions on embedded systems. All itWatch products are developed and tested in Germany and sold worldwide through partners.
Address
itWatch GmbH
Aschauer Str. 30
81549 Munich
Germany
Phone: +49 89 62030100
Fax: +49 89 620301069
Internet: itwatch.de
Capturing, releasing, and blocking each application in real-time using Black- and White-List
Application Watch enforces your security policy “what programs will be locally available” for all computers in your network. ApplicationWatch prevents the usage of malware or non-licensed software and protocols attempted access from unauthorized personal. The administration will be done centrally using security policies and defining individual rights for applications not depending on the user‘s rights.
Extensive, modular protection for identities, interfaces and resources in all security classes
The functions of the itWESS include protection against data theft (DLP), endpoint security, EDR, encryption, security awareness in real time, a secure keyboard, risk auditing in real time, MalWareTrap, secure deletion, logging, virtual lock systems, the control of devices, ports, applications, content, media and printing, cost-reducing added value in operation and the simple use of security solutions.
A mobility solution for all security classes
Bootable work environment from encrypted USB stick enables complete mobility of the individual workstation standardized in the company with central and local applications and data including secure patch management and all functions required for operation. Optimal as a secure home workstation on any third-party hardware.
Click here if you notice an image that violates copyright or privacy rights.
We only use functionally necessary cookies and the web analysis tool Matomo in order to optimally design and continuously improve our website for you. By continuing to use our website, you agree to this. Further information and an objection possibility can be found here: Data protection