This software provides complete security to your server as well as your data. This software makes us stand out in the market making us one of the very few who provide guaranteed security from ransomware. It provides complete data security from internal and external threats like data theft, viruses, ransomware, hardware failures.

Another important feature of this software are:

  • Brute-force attack defender which actively blocks hacking attacks by blocking IP’s.
  • Two-Factor-Authentication / OTP for logging in to the cloud is also possible through it.
  • IP/mac address restriction to restrict users to login in from allowed PC’s,laptops etc.
  • Working Hours Restriction: User wise work hour restrictions can be set as sometimes it varies from person to person.
  • Homeland Protection: Prevents foreign attackers from opening remote sessions.
  • Permissions: Inspect and Manage Users and Groups Permissions on folders and files with just a few clicks.
  • One Click to Secure Desktop: Simple remote access group policy control.
  • End-Point Device Protection: Restrict access by device name.

Features Overview

With an access to the 5 last security events, Comhard-Plus Security Homepage is a real dashboard, showing at a glance how secure your network is. Take action without losing any second! If necessary, you can also directly update to the latest version

 

img1

Homeland Protection

If your users are located in the US, UK and India, It may not make sense to allow connections from China, Canada, Iran, or Germany.
Using country based whitelists, Homeland Protection lets administrators quickly and easily restrict incoming connections to the countries necessary for your business operations.

Brute Force Defender

Brute force attacks are one of the oldest tricks in the hacker’s tool kit. Using automated bots, hackers can attempt to force access using password generators. These attacks can number in the hundreds or even thousands of attempts per minute. Even an unsuccessful brute force attack can have negative performance impacts on your server.

BruteForce Defender stops brute force attacks quickly. Your server will no longer have to process thousands of failed login attempts. BruteForce Defender uses a combination of whitelists and limits on failed login attempts to reject brute force attacks before they become a problem!

Global IP Management

Easily manage IP addresses from one place with a single list for both blocked and whitelisted IP addresses.
This means that all IPs detected by Homeland and BruteForce protections are centralized here to check, edit, add or remove at your convenience. IP address lists are searchable, making address management easy.
This feature is included in Comhard-Plus Security Essentials.

Permissions

On Windows, permissions are taken care of by the Operating System which defines, by default, the scope of privileges for each user profile (read, write, modify) and automatically prevents access to sensitive locations on the server.

There are times, however, when it’s necessary to manually configure permissions for the best network security. That’s the case if your organization uses Remote Desktop technology.

The “Permissions” dashboard displays the list of users and groups and the list of available folders, side-by-side. Everything is visible at one spot, which makes it super easy to Inspect (Comhard-Plus Essentials) and Edit (Comhard-Plus Ultimate) privileges for one user at a time, increasing the accuracy of the restrictions.

This feature is included in Comhard-Plus Security Essentials (Inspect) and Comhard-Plus Ultimate (Inspect and Manage).

 

Working Hours Restriction

Network security is more complicated than just deciding who can access your servers. Once you have granted access to all the right people, the question becomes: When should the users have access?
Working Hours give administrators the tools limit remote access to only the days and times required for business operations.
This feature is included in Comhard-Plus Security Essentials.

 

Secure Desktops*

With Secure Desktops, we have taken the guesswork out of Group Policy management.
Secure Desktops offers a simple slider interface to choose access policies for users or groups. Each level of security has been meticulously crafted to the IT industry’s best practices standards.

img6

EndPoint Protection*

User credentials are always a potential vulnerability. With large scale data breaches happening regularly and user information being exposed by even some of the most trusted internet sources, enforcing extra layers of security is a necessary part of server administration. Keeping those processes transparent to the end user isn’t always easy.

Endpoint Protection offers a simple way to keep your servers safe, even if a user’s credentials have been compromised.

With Endpoint Protection, Administrators can link user accounts directly to specific device names. If a user’s credentials become compromised, attackers can’t use them to log in to your servers without a device that is linked to that user.

Stop Ransomware Attacks*

Ransomware is the most significant of today’s cyber threats. Attackers can encrypt or even permanently delete your data. Paying the ransom is no guarantee that your data will be restored. The best way to deal with ransomware is to stop it before attackers have the chance to disrupt your server. Ransomware Protection will efficiently detect and block ransomware attacks.

Ransomware Protection instantly warns you as soon as it detects a ransomware activity on your system, providing you with the list of the infected items to quarantine. You get detailed information about the attack source to avoid this issue in the future. You can easily whitelist the programs you know as safe via the “Advanced Settings” tab!

 

Who Can Benefit from Our Intervention?

  • Our tool will perfectly meet the expectations of any company that allows remote access to their servers
  • Risk managements officers
  • Security specialists
  • IT administrators and tech support
  • Other professionals and regular users concerned with IT security