home *** CD-ROM | disk | FTP | other *** search
- ============================== Features ==============================
-
- Versatile Protection
- --------------------
- StopLight 95 ELS provides robust security in a small, easy to administer
- package. It is the ideal solution for protecting sensitive data
- and preventing unwanted changes to the system and its programs.
- Through efficient high-security design, StopLight 95 ELS can protect
- PCs and laptops in the home, business and school environment.
-
-
- Windows Security Solution
- -------------------------
- StopLight 95 ELS protects Windows 95 and Windows 3.x computers with
- award-winning security technology. Its Windows setup makes it easy to
- configure the exact protection that's needed. Security is provided
- for Windows 95, Windows 3.x and DOS. Long filenames are supported.
-
-
- Protect Sensitive Data
- ----------------------
- Protect access to drives, directories and files on a user by user
- basis. Control Read, Write, Create, Delete and Execute privileges.
- By removing all privileges, access to that item is denied.
-
-
- Keep Computers Working!
- -----------------------
- Ideally, PCs should work every day. But in many situations, such as
- in libraries and computer labs, users unintentionally (or
- intentionally) change the computer's settings, preventing them from
- running as intended. Use StopLight 95 ELS to lock down a computer's
- configuration and prevent unauthorized changes.
-
-
- Stop Pirated Software
- ---------------------
- With a special feature of StopLight 95 ELS, you can prevent certain users
- from installing software onto the system. This stops software piracy
- and also reduces the virus threat. Configured with this option,
- only designated users or the administrator can install software.
-
-
- Protect Unattended Workstations
- -------------------------------
- StopLight 95 ELS includes a keyboard lock and screen saver that are
- activated by hot-key, icon, or after a period of system inactivity.
- If a user is logged into the network, their network files will
- also be protected. Programs that were running before the keyboard
- lock is activated will continue to run securely in the background.
-
-
- Track User Activity
- -------------------
- Record some or all user actions to a secure audit log. Included
- in the brief log are the date and time of user login and logout,
- programs that were run, keyboard lock timeouts and security
- violations. The full log setting also also tracks every file that
- is read, written, created and deleted. The log file can be
- filtered and viewed on screen, or exported to a database file for
- use in other programs.
-
-
- ======================================================================
- If we can be of further assistance to you, please contact us at:
-
- Safetynet, Inc.
- Customer Service Dept.
- 140 Mountain Ave.
- Springfield, NJ 07081 USA
-
- Sales - 1-973-467-1024
- Support - 1-973-467-0465
- Fax - 1-973-467-1611
- BBS - 1-973-467-1581 (28800,N,8,1)
-
- WWW - http://www.safetynet.com
- Sales E-Mail - safety@safetynet.com
- Support E-Mail - support@safetynet.com
- CompuServe - go safe
-
- International Sales - +1 908-276-9641
- International Fax - +1 908-276-6575
-