Webyne-Shield-Features

All Features

The all-in-one cybersecurity software designed for remote access.




Homeland Protection

RESTRICT REMOTE ACCESS TO THE PEOPLE THAT NEED IT

 

Brute Force Defender

 
Brute Force Defender enables you to protect your public server from hackers, network scanners and brute-force robots that try to guess your Administrator login and password. Monitor Windows failed login attempts and automatically block the offending IP addresses after a pre-determined number of failures.

Easily configure the maximum logon attempts by IP address. In addition, Brute Force Defender displays the current status of the Advanced Security service, Windows Firewall, Windows Logon Audit and HTML5 web portal logs.

Global IP Management

EASILY MANAGE IP ADDRESSES FROM A UNIFIED ALLOW/BLOCK LIST

Easy Management

Manage both blocked and whitelisted IP addresses with a single list.

Search Bar

Conveniently search the unified IP address list to find and easily manage your access list. For example, if we searched for blocked addresses, by entering the word “blocked” on the search bar, all the blocked IPs will be displayed.

IP Address Description

Provide meaningful descriptions to any IP addresses to quickly identify them in the future.

Multi-address Editing

Add multiple blocked IP addresses to your whitelist in a single action

 

Working Hours

LIMIT REMOTE ACCESS TO BUSINESS HOURS

Only authorize users or groups to connect during certain days and timeslots. It is possible to select a specific time zone depending on your user’s office location.

Manage timeslot permissions for specific users or groups. If a user belongs to several groups, the most permissive permissions apply.

User sessions can be automatically disconnected at the end of the permitted timeslot. 

Schedule a warning message to notify the user before they are automatically logged off.

Ransomware Protection

EFFICIENTLY DETECT, BLOCK AND PREVENT RANSOMWARE ATTACKS​

Instant Ransomware Detection and Reaction

Web Advance Security reacts as soon as it detects ransomware on your server. It possesses both static and behavioral analysis: The static analysis enables the software to react immediately when an extension name changes. The behavioral analysis looks at how a program will interact with files and detect new strains of ransomware.

Predictive Behavioral Detection

Ransomware Protection uses pure behavioral detection techniques and does not rely on malware signatures, enabling it to catch ransomware unknown to antivirus and antimalware software. To ensure a greater level of protection, Ransomware Protection also creates bait files in key folders where ransomware attacks often originate.

Seamless Learning Period

Without disrupting server activity, the learning period enables Web Advance Security to learn standard behaviors of users and applications to identify all legitimate business applications.

Ransomware Protection Action

Web Advance Security automatically stops the attack and quarantines the affected programs and files. Administrators can review the list of quarantined items and decide to whitelist specific entries.

Ransomware Protection Report

Administrators learn to anticipate threats by identifying the source of attacks and analyzing running processes listed in reports.

Email Alerts

Be alerted in real-time. Configure your SMTP settings for Web Advanced Security to send you email alerts to highlight important security events.

Snapshots

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Ignored file extensions

Easily define the file extensions that need to be excluded from the Ransomware Protection analyses.

ransomware

 

Permissions

MANAGE REMOTE ACCESS PERMISSION FOR USERS, GROUPS AND FILES




Secure Desktop

CONFIGURE THE SECURITY LEVEL FOR EACH USER OR GROUP
 

Standard Security Levels

You can configure the security level for each user or group by selecting one of three standardized security levels crafted to the IT industry’s best practices standards: ‍

  • Windows Mode: access to default Windows session
  • Secured Desktop Mode: access to documents, printers, Windows key and session disconnection
  • Kiosk Mode: prevent a connected user from running prohibited actions.

Customize Security Level

Administrators can easily customize the security level of each of the three standard modes to their own needs. Simply select or unselect folders, disks and applications.

Right Click and Context Menu Restrictions

Restrict the ability to right click and access the Context Menu to prevent users from performing unwanted actions.

 

Endpoint Protection and Device Control

BLOCK COMPROMISED CREDENTIALS AND UNWANTED DEVICES

Administrators can decide whether a user can connect from any device or only specific device names. Web Advance Security automatically creates a list of devices that attempt to connect, facilitating the administrator’s task of accepting or denying access from specific devices.

By pairing devices to user accounts, Endpoint Protection prevents compromised credentials from being used to access your network, because the attacker would need an authorized device to connect.




Hacker IP Protection

BENEFIT FROM OUR WORLDWIDE COMMUNITY BLACKLIST OF KNOWN THREATS

Keep your machine protected against known online attacks, on-line service abuse, malware, botnets and other cybercrime activities. Hacker IP Protection leverages the information provided by the community of Advanced Security users to automatically blacklist more than 368 million identified threats daily




Advanced Security Admin Tool

EASILY MANAGE AND CONFIGURE ALL SECURITY FEATURES