Argent for Security

Argent for Security alerts you whenever an employee copies a file to a CD or mem-stick or any USB device.

The leaking of over 200,000 U.S. Top Secret files by a person who copied these files to writable CDs disguised as Lady Gaga audio CDs would have been prevented by Argent for Security.

You spend a fortune to block Russian hackers breaking into to your network, but the biggest threat is from disgruntled employees, as the Lady Gaga case chillingly shows.

There are a small minority of employees who are actively looking to steal your trade secrets — business plans, blueprints, compensation plans, sales projections and CRM databases — to sell to your competitors.

With the Internet, it’s simple to send money to Panama or other countries with opaque banking systems, and some of your employees today are looking at what they can steal from you. You only need one breach for your company to be put out of business or for you to be fired for “gross negligence”

Argent for Security guarantees the safety of all your servers and all your desktops.

Argent for Security installs in under 10 minutes and uses no dangerous kernel mode code and no dangerous device drivers — Argent for Security is safe and easy to use.

Argent for Security can optionally interface to Active Directory, or you can use Argent for Security as a free-standing product.

If you have compliance requirements such as Sarbanes, HIPAA, PCI, etc, then Argent for Security is a must-have: these strict compliance laws require you to be safe from external Russian hackers and also from internal disgruntled employees.

The following is a partial list of installed Rules. Out-of-the-box, Argent handles over 95% of your day-to-day needs.
Argent solves all your day-to-day problems — automatically.

CD/DVD Events

  • CD/DVD Media Loaded
  • CD/DVD Media Ejected

USB Storage Events

  • USB Storage Attached
  • USB Storage Detached

File/Directory Changes

  • File or Directory Created
  • File or Directory Deleted
  • File or Directory Renamed
  • File or Directory Modified

Event Logs

  • Audit Logs Cleared
  • Audit Logs Stopped
  • Hacking Attempts
  • Unauthorized Account Changes

System Management Scripts

  • PowerShell Scripts
  • WMI Scripts