All Features
The all-in-one cybersecurity software designed for remote access.
Homeland Protection
RESTRICT REMOTE ACCESS TO THE PEOPLE THAT NEED IT
Country Restriction
Block unwanted countries and allow access from specific countries. Easily whitelist or block IP addresses from allowed countries.
Internet and IP Access Restriction
Restrict access from the Internet. If your remote access environment is meant to be private, define your internet access restriction to “only private and whitelisted IP addresses”.
Event Interaction
Add or remove processes that are watched by the Homeland Protection feature. Easily add ports to the Homeland Protection Feature watch list.
Brute Force Defender
Easily configure the maximum logon attempts by IP address. In addition, Brute Force Defender displays the current status of the Advanced Security service, Windows Firewall, Windows Logon Audit and HTML5 web portal logs.
Global IP Management
EASILY MANAGE IP ADDRESSES FROM A UNIFIED ALLOW/BLOCK LIST
Easy Management
Manage both blocked and whitelisted IP addresses with a single list.
Search Bar
Conveniently search the unified IP address list to find and easily manage your access list. For example, if we searched for blocked addresses, by entering the word “blocked” on the search bar, all the blocked IPs will be displayed.
IP Address Description
Provide meaningful descriptions to any IP addresses to quickly identify them in the future.
Multi-address Editing
Add multiple blocked IP addresses to your whitelist in a single action
Working Hours
LIMIT REMOTE ACCESS TO BUSINESS HOURS
Day and Time Restrictions
Only authorize users or groups to connect during certain days and timeslots. It is possible to select a specific time zone depending on your user’s office location.
User and Groups Permission
Manage timeslot permissions for specific users or groups. If a user belongs to several groups, the most permissive permissions apply.
Automated Disconnection
User sessions can be automatically disconnected at the end of the permitted timeslot.
Notifications
Schedule a warning message to notify the user before they are automatically logged off.
Ransomware Protection
EFFICIENTLY DETECT, BLOCK AND PREVENT RANSOMWARE ATTACKS
Instant Ransomware Detection and Reaction
Web Advance Security reacts as soon as it detects ransomware on your server. It possesses both static and behavioral analysis: The static analysis enables the software to react immediately when an extension name changes. The behavioral analysis looks at how a program will interact with files and detect new strains of ransomware.
Predictive Behavioral Detection
Ransomware Protection uses pure behavioral detection techniques and does not rely on malware signatures, enabling it to catch ransomware unknown to antivirus and antimalware software. To ensure a greater level of protection, Ransomware Protection also creates bait files in key folders where ransomware attacks often originate.
Seamless Learning Period
Without disrupting server activity, the learning period enables Web Advance Security to learn standard behaviors of users and applications to identify all legitimate business applications.
Ransomware Protection Action
Web Advance Security automatically stops the attack and quarantines the affected programs and files. Administrators can review the list of quarantined items and decide to whitelist specific entries.
Ransomware Protection Report
Administrators learn to anticipate threats by identifying the source of attacks and analyzing running processes listed in reports.
Email Alerts
Be alerted in real-time. Configure your SMTP settings for Web Advanced Security to send you email alerts to highlight important security events.
Snapshots
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Ignored file extensions
Easily define the file extensions that need to be excluded from the Ransomware Protection analyses.
Permissions
MANAGE REMOTE ACCESS PERMISSION FOR USERS, GROUPS AND FILES
Side-by-side Permission Dashboard
Easily inspect and edit permissions of users, groups, files, folders and printers in a dashboard listing those elements side-by-side. Choose from four permissions: Deny, Read, Modify or Ownership.Inspect Permissions
Easily inspect permissions applied to each folder, subfolder or file by simply clicking on them in a tree view. Quickly assess what permissions are assigned to which user or groups. Audit specific files to monitor permissions in the event viewer.
Secure Desktop
CONFIGURE THE SECURITY LEVEL FOR EACH USER OR GROUP
Standard Security Levels
You can configure the security level for each user or group by selecting one of three standardized security levels crafted to the IT industry’s best practices standards:
- Windows Mode: access to default Windows session
- Secured Desktop Mode: access to documents, printers, Windows key and session disconnection
- Kiosk Mode: prevent a connected user from running prohibited actions.
Customize Security Level
Administrators can easily customize the security level of each of the three standard modes to their own needs. Simply select or unselect folders, disks and applications.
Right Click and Context Menu Restrictions
Restrict the ability to right click and access the Context Menu to prevent users from performing unwanted actions.
Endpoint Protection and Device Control
BLOCK COMPROMISED CREDENTIALS AND UNWANTED DEVICES
Device Control
Administrators can decide whether a user can connect from any device or only specific device names. Web Advance Security automatically creates a list of devices that attempt to connect, facilitating the administrator’s task of accepting or denying access from specific devices.
Endpoint Protection
By pairing devices to user accounts, Endpoint Protection prevents compromised credentials from being used to access your network, because the attacker would need an authorized device to connect.
Hacker IP Protection
BENEFIT FROM OUR WORLDWIDE COMMUNITY BLACKLIST OF KNOWN THREATS
Block Malicious IP Addresses
Keep your machine protected against known online attacks, on-line service abuse, malware, botnets and other cybercrime activities. Hacker IP Protection leverages the information provided by the community of Advanced Security users to automatically blacklist more than 368 million identified threats daily
Advanced Security Admin Tool
EASILY MANAGE AND CONFIGURE ALL SECURITY FEATURES
User-friendly Dashboard
Quickly access the settings of all available security measures, view the latest security events, easily access the event logs and assess the status of your system from your Advanced Security dashboard.
Event Logs and Features Status
Easily monitor, navigate, search and interact with your security events. The events are logged and refreshed every few seconds. Monitor the stataus of each Web Advance Security feature individually at the top of the Security Event Log tab.
System Audit
Quickly identify issues using the System Audit feature available on the home tab. Monitor Advanced Security's connection and operation status. View the status of your server's firewall (Windows or TSplus Firewalls supported). Ensure that all passwords respect the minimum length.
Lite Mode
The Advanced Security dashboard is available in two modes: Lite and Expert. Use the Lite Mode for an easy-to-read overview of the main events, features and settings.
Event Interaction
Use the search bar to quickly find priority events. Simply right click on each event to interact with it.