{"id":10301,"date":"2024-01-14T22:34:34","date_gmt":"2024-01-14T22:34:34","guid":{"rendered":"https:\/\/convex-network.ro\/?page_id=10301"},"modified":"2024-06-17T23:56:00","modified_gmt":"2024-06-17T23:56:00","slug":"dataleakdiscovery-solutions","status":"publish","type":"page","link":"https:\/\/convex-network.ro\/en\/cyber-security\/data-security\/dataleakdiscovery-solutions\/","title":{"rendered":"DataLeak&amp;Discovery\u00a0Solutions"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"10301\" class=\"elementor elementor-10301 elementor-2822\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-bac231e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bac231e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3b870b0\" data-id=\"3b870b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-42b89d8 elementor-widget__width-initial elementor-widget-widescreen__width-initial elementor-widget-laptop__width-initial elementor-widget-tablet__width-initial go-back elementor-widget elementor-widget-aux_button\" data-id=\"42b89d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<button   class=\"aux-button aux-tiny aux-dark-orange aux-round aux-outline aux-uppercase aux-icon-left\" ><span class=\"aux-overlay\"><\/span><i aria-hidden=\"true\" class=\"aux-icon auxicon2 auxicon2-arrow-backward\"><\/i><span class=\"aux-text\">Back<\/span><\/button>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1249e0d elementor-widget elementor-widget-aux_breadcrumbs\" data-id=\"1249e0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"aux-elementor-breadcrumbs\"><p class=\"aux-breadcrumbs\"><span><a href=\"https:\/\/convex-network.ro\/en\/\" title=\"Home\">Home<\/a><\/span><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e2470f6 elementor-widget elementor-widget-html\" data-id=\"e2470f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script type=\"text\/javascript\">    jQuery(document).ready(function() {     jQuery('#go-back').on('click', function() {       window.history.go(-1);        return false;     }); });   <\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-008085e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"008085e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-51eab5f\" data-id=\"51eab5f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-083e103 aux-appear-watch-animation aux-fade-in-right elementor-widget elementor-widget-aux_modern_heading\" data-id=\"083e103\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<section class=\"aux-widget-modern-heading\">\n            <div class=\"aux-widget-inner\"><h6 class=\"aux-modern-heading-primary\">DataLeak&amp;Discovery Solutions<\/h6><div class=\"aux-modern-heading-divider\"><\/div><\/div>\n        <\/section>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-311b910 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"311b910\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e032aaf\" data-id=\"e032aaf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9c41b27 elementor-widget__width-initial aux-appear-watch-animation aux-slide-from-bot elementor-widget elementor-widget-aux_modern_heading\" data-id=\"9c41b27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<section class=\"aux-widget-modern-heading\">\n            <div class=\"aux-widget-inner\"><p class=\"aux-modern-heading-primary\"><\/p><h4 class=\"aux-modern-heading-secondary\"><span class=\"aux-head-before\">Endpoint Protector<\/span><\/h4><div class=\"aux-modern-heading-description\"><p><span class=\"TextRun Highlight SCXW212697532 BCX0\" lang=\"RO-RO\" xml:lang=\"RO-RO\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW212697532 BCX0\">DLP = <\/span><span class=\"NormalTextRun SCXW212697532 BCX0\">DATA LOST PREVENTION<\/span><\/span><\/p><\/div><\/div>\n        <\/section>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98763a9 elementor-widget elementor-widget-text-editor\" data-id=\"98763a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">The plug &amp; play technology allows connecting various portable storage devices, from USB sticks to external hard drives, digital cameras or MP3 players or iPods, to your computer or laptop in a few seconds.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Almost all PCs with Windows or Apple MacOS have both USB ports and other connection ports for peripherals, and this facilitates the accidental loss or theft of data.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">In addition to data loss, computer connections (both those made through physical ports and software \/ virtual ones made through wifi, Bluetooth or the Internet) easily allow computers inside a company to be infected if they are left unprotected. Network administrators had limited means of stopping data loss or computer infection when dealing with irresponsible or malicious users. This was a sad truth.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Today Endpoint Protector is here to help stop these threats.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-381d666 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"381d666\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-95299ce\" data-id=\"95299ce\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9626c87 elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"9626c87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-9626c87\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-custom-id-offset=\"500\" data-accordion-id=\"9626c87\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n            <div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"these-are-the-biggest-advantages-of-an-endpoint-dlp-solutions-\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-1571\"><span class=\"eael-accordion-tab-title\">These are the biggest advantages of an endpoint DLP solutions:  <\/span><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><\/div><div id=\"elementor-tab-content-1571\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"these-are-the-biggest-advantages-of-an-endpoint-dlp-solutions-\"><ul><li><b><span>Protecting data on the go<\/span><\/b><span>\u00a0<\/span><\/li><\/ul><p><span>One of the main benefits of endpoint DLP is that it\u2019s not dependent on a corporate network to function. Data loss prevention policies are applied at the computer level, and they will continue to protect sensitive information in real-time whether an employee is working on-premises or remotely.<\/span><span>\u00a0<\/span><\/p><p><span>With today\u2019s workforce becoming increasingly mobile and the risks inherent in any environment outside the security of a company network, it is essential that data be protected regardless of endpoint devices\u2019 physical location.<\/span><span>\u00a0<\/span><\/p><p><span>Using endpoint DLP, companies do not need to restrict employees\u2019 mobility, limiting their ability to travel and work from anywhere. They can rest assured that sensitive data will remain just as secure, whether they are at a conference, at a client\u2019s office, or at home.<\/span><\/p><ul><li><b><span>Controlling portable devices<\/span><\/b><span>\u00a0<\/span><\/li><\/ul><p><span>Another easy way sensitive data is lost is through removable media. Employees can copy files onto personal USBs without violating any network DLP policy. Endpoint DLP, however, enables administrators to choose different levels of trust for devices based on specific criteria. In this way, they can, for example, allow only company devices to connect to endpoints or block them all. Not being dependent on the company network to function, these policies can be enforced even offline.<\/span><span>\u00a0<\/span><\/p><p><span>Additional features can offer encryption capabilities for USBs. Organizations can ensure that file transfers from an organization\u2019s endpoints onto portable devices, be they company-owned or not, are automatically encrypted. In this way, sensitive information is always protected even when it is physically on the move. In case of lost encryption passwords or malicious insiders, admins even can reset passwords or remotely wipe USBs.<\/span><\/p><ul><li><b><span>Data visibility on the endpoint<\/span><\/b><span>\u00a0<\/span><\/li><\/ul><p><span>While network DLP products are good at keeping data from traveling outside company networks, they usually do not offer content discovery capabilities on the endpoint. This means that companies do not know if employees have sensitive information stored on their computers.<\/span><span>\u00a0<\/span><\/p><p><span>This is a major issue when it comes to compliance: many data protection regulations require companies to restrict access to sensitive information and store it only for as long as it is needed for the original purpose it was collected for. On top of that, many data subjects now have the right to request that their data be deleted or have the option to withdraw consent for data processing.<\/span><span>\u00a0<\/span><\/p><p><span>If organizations do not know where their data is stored on company endpoints, they risk running foul of data protection regulations and incurring steep fines for noncompliance. Using endpoint DLP, admins can scan data at rest on computers company-wide and take remediation actions when it is found. Information can be deleted or encrypted based on needs, thus ensuring that companies can enforce the right to be forgotten and restrictions that need to be applied for compliance with data protection regulations.<\/span><span>\u00a0<\/span><\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"what-is-endpoint-protector-\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-1572\"><span class=\"eael-accordion-tab-title\">What is Endpoint Protector? <\/span><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><\/div><div id=\"elementor-tab-content-1572\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"what-is-endpoint-protector-\"><p><span>Endpoint Protector will help you secure your PCs endpoints within your network.<\/span><span>\u00a0<\/span><\/p><p><span>You will be able to restrict the use of both internal and external devices which can be used for data storage and transfer and to manage PC and MAC ports.<\/span><span>\u00a0<\/span><\/p><p><span>Endpoint Protector gives network administrators the control needed to keep network endpoints safe.<\/span><span>\u00a0<\/span><\/p><ul><li><span>Control use of all USB and other storage devices<\/span><span>\u00a0<\/span><\/li><\/ul><ul><li><span>Tracking of what data is saved to storage devices<\/span><span>\u00a0<\/span><\/li><li><span>Tracking of what data is copied from and to storage devices<\/span><span>\u00a0<\/span><\/li><li><span>Authorize the use of USB storage devices<\/span><span>\u00a0<\/span><\/li><li><span>Securing data on USB storage devices<\/span><span>\u00a0<\/span><\/li><li><span>Powerful reporting tool and audit<\/span><span>\u00a0<\/span><\/li><\/ul><p><span>The modular and intuitive Web-based administration interface has been designed to offer fast access to controlling computer, devices, and user behavior in a large network. It also offers several ways to track any kind of portable device related activity registered on the system. A detailed report including timestamps, file names, action(s) taken, logged user, etc. allows for pin-pointing malicious behavior and users.<\/span><span>\u00a0<\/span><\/p><p><span>The system&#8217;s design also allows the vendor\u2019s support team to perform easy customizations and extensions requested by clients. Better automation and express reports can be developed according to customer demands. At the same time this structure is easy to update and maintain, making the usability even greater.<\/span><span>\u00a0<\/span><\/p><p><span>Endpoint Protector is the only solution that gives companies of any size the ability to let users take advantage of the increasingly important functionality of USB and other ports without losing control over data and compliance.\u00a0<\/span><span>\u00a0<\/span><\/p><p><span>This endpoint security device control solution is designed to control usage of all portable storage and to keep track of what data users are taking from and to their work computers on any kind of portable storage devices.<\/span><span>\u00a0<\/span><\/p><p><span>Furthermore, Endpoint Protector enables network administrators to monitor and report what data is introduced into the corporate network from a portable storage device such as prohibited materials (MP3s, movies or games) or harmful data like a virus that could jeopardize the networks integrity.<\/span><span>\u00a0<\/span><\/p><p><span>As not all portable storage devices are used with the intent to harm the company, many legitimate reasons commonly justify the need of such devices to increase network users&#8217; productivity. Thus, Endpoint Protector allows authorized use of certain device types or specific devices such as the companies&#8217; own USB Flash Drives to handle and transfer confidential data.<\/span><span>\u00a0<\/span><\/p><p><span>To ensure the protection of data carried by users on authorized devices, the Endpoint Protector administrator can allow users to copy work data only to a password protected \/ encrypted area of a authorized device, a so called \u201cTrustedDevice\u201d. In this way confidential corporate data is protected in case of hardware loss.<\/span><span>\u00a0<\/span><\/p><p><span>Endpoint Protector creates an audit trail that shows the use and activity of portable storage devices in corporate networks. Thus, administrators have the possibility to trace and track file transfers through endpoints and then use the audit trail as legal evidence for data theft.<\/span><span>\u00a0<\/span><\/p><\/div>\n\t\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-9ee959c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9ee959c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-eb598f7\" data-id=\"eb598f7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0bb5faf elementor-widget__width-initial aux-appear-watch-animation aux-slide-from-bot elementor-widget elementor-widget-aux_modern_heading\" data-id=\"0bb5faf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<section class=\"aux-widget-modern-heading\">\n            <div class=\"aux-widget-inner\"><p class=\"aux-modern-heading-primary\"><\/p><h4 class=\"aux-modern-heading-secondary\"><span class=\"aux-head-before\">Lansweeper <\/span><\/h4><div class=\"aux-modern-heading-description\"><p><span class=\"TextRun MacChromeBold SCXW40410933 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW40410933 BCX0\">The best automated IT Discovery &amp; Network Inventory solution.<\/span><\/span><span class=\"EOP SCXW40410933 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><\/div><\/div>\n        <\/section>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-941439a elementor-widget elementor-widget-text-editor\" data-id=\"941439a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Technology continues to grow faster than anyone can keep up. IT professionals all around the world struggle to answer seemingly simple questions about their IT estate:\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Who owns which device?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">How many software installs do we have from this vendor?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">We\u2019re seeing strange behavior from this IP address, what is it?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Am I fully compliant with IT governance industry frameworks?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">Which devices need to be replaced next year?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li><\/ul><p><span data-contrast=\"auto\">Lansweeper is the answer all these questions\u2026 Supporting any IT scenario with accurate, reliable data and an always-up-to-date Inventory.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Lansweeper automatically discovers and identifies any asset in your environment. Depending on the asset types found, it retrieves all kinds of device-specific hardware information, as well as an extensive list of installed software and user information. It doesn\u2019t matter if the assets are on-prem, in the cloud, physical or virtual, Lansweeper scans it all.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Global organizations can connect multiple, geographically distributed sites into 1 single overview. Lansweeper Cloud extension allows you to securely access your data from anywhere, at any time &#8211; enabling centralized management of remote sites.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Lansweeper enables your IT department to:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"11\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"6\" data-aria-level=\"1\"><span data-contrast=\"auto\">discover,\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"11\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"7\" data-aria-level=\"1\"><span data-contrast=\"auto\">analyze,\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"11\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"8\" data-aria-level=\"1\"><span data-contrast=\"auto\">control\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"11\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"9\" data-aria-level=\"1\"><span data-contrast=\"auto\">coordinate your entire IT network.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-41aacfb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"41aacfb\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-55d5e2f\" data-id=\"55d5e2f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f75b13c elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"f75b13c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-f75b13c\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-custom-id-offset=\"500\" data-accordion-id=\"f75b13c\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n            <div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"1-discovery-\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-2591\"><span class=\"eael-accordion-tab-title\">1. Discovery <\/span><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><\/div><div id=\"elementor-tab-content-2591\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"1-discovery-\"><p><span>Lansweeper can scan for devices on network, discover network devices and find all devices on network with the network scanner.<\/span><span>\u00a0<\/span><\/p><p><span>A general overview of all of devices on the network, can be found under the \u2018assets\u2019 tab in the Lansweeper web console. This list can easily be filtered on basic parameters like type, model, and manufacturer using the search fields.<\/span><span>\u00a0<\/span><\/p><p><span>By clicking on a specific device, you can access the asset page, where you will find a detailed summary of the data Lansweeper picked up like user logon, memory, anti-virus information network devices attached and so on. Further down you can find asset groups and related assets and users and also details like hardware specifications, registry values or file properties. For several manufacturers, Lansweeper can also retrieve warranty information.<\/span><span>\u00a0<\/span><\/p><p><span>The software tab gives you an extensive software list, ranging from installed applications all the way to SQL server database information.\u00a0<\/span><span>\u00a0<\/span><\/p><p><span>For virtual machines Lansweeper will also show where it is hosted. Virtual machines and their hosts are scanned as individual devices. For the hosts Lansweeper gathers general specs and additional hardware details like disks and network interfaces. If the device is a VMware or HyperV host it will also list the installed guest machines.\u00a0<\/span><span>\u00a0<\/span><\/p><p><span>Lansweeper also scans Mac and Linux devices for hardware and software specifications. Lansweeper also provides specific details on all kinds of network devices.\u00a0<\/span><span>\u00a0<\/span><\/p><p><span>Lansweeper can scan various targets to gather information from your network. All targets are agentless and don\u2019t require anything to be installed on your target machines.\u00a0<\/span><span>\u00a0<\/span><\/p><p><span>Several Active directory scanning targets are available to retrieve both computer and user information from an entire domain or a select number of sites or OUs.\u00a0<\/span><span>\u00a0<\/span><\/p><p><span>IP range scanning, scans all devices in any IP range specified by you, using a wide array of network protocols. These scans can be scheduled or triggered manually.\u00a0<\/span><span>\u00a0<\/span><\/p><p><span>The workgroup scanning target will retrieve information from all newly logged on Windows devices in a submitted workgroup.<\/span><span>\u00a0<\/span><\/p><p><span>Once all assets have been scanned, you can use additional scanning targets to rescan specific asset groups, types, and reports.\u00a0<\/span><span>\u00a0<\/span><\/p><p><span>Lansweeper can scan your network completely agentless, but it can also use an agent to gather data locally and send it back to Lansweeper installation.<\/span><span>\u00a0<\/span><\/p><p><span>For Lansweeper to remotely access assets it needs to a map of credentials &#8211; these username and password combinations are always encrypted and stored locally, and Lansweeper will never send them across the network or internet.<\/span><span>\u00a0<\/span><\/p><p><span>Once your scanning targets and credentials are in place, Lansweeper is ready to discover your network.<\/span><span>\u00a0<\/span><\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"2-analyze-and-visualize-the-data\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-2592\"><span class=\"eael-accordion-tab-title\">2. Analyze and visualize the data.<\/span><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><\/div><div id=\"elementor-tab-content-2592\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"2-analyze-and-visualize-the-data\"><p><span>After Lansweeper scanned the assets in the IT network, can start reporting on the data found, dynamically group assets, run network reports and use automated emails alerts based on the results.<\/span><span>\u00a0<\/span><\/p><p><span>The dashboard is a customized view of relevant information about an organization\u2019s IT environment. Your IT techs can organize key metrics by dragging and dropping the desired widgets you want to monitor and share these across all IT divisions.\u00a0<\/span><span>\u00a0<\/span><\/p><p><span>Lansweeper automatically sorts all computers and devices into categories such as the domain they belong to or their specific device type like firewalls or printers. Your IT techs can also add custom types if needed.<\/span><span>\u00a0<\/span><\/p><p><span>Another way to easily bring structure to the massive amount of retrieved data is by <\/span><b><span>asset groups<\/span><\/b><span>.\u00a0 An IP range group simply combines the assets within a specified IP range while a static group contains a certain set of assets that have been assigned to it. For a dynamic group, Lansweeper will automatically gather the assets, based on a set of criteria of your choosing like device type or operating System.\u00a0 There are several built-in groups, but of course, if you have your own system to organize your assets you can create custom groups, making the asset combinations that are of value to you.\u00a0\u00a0<\/span><span>\u00a0<\/span><\/p><p><span>Another, more adaptable way of organizing information is via <\/span><b><span>reports<\/span><\/b><span>. Reports can gather more specific data in a convenient overview. Lansweeper contains hundreds of built-in reports to get you started. Let\u2019s have a look at a couple of them.<\/span><span>\u00a0<\/span><\/p><ul><li><span>\u201cThe Asset: Out of warranty report\u201d will present us with a list of devices in your network of which the warranty has expired.\u00a0<\/span><span>\u00a0<\/span><\/li><\/ul><ul><li><span>Another example is the \u2018unauthorized software\u2019 report. If you run this one, it will alert you of installations of any software packages that you have labeled as unauthorized in your network.<\/span><span>\u00a0<\/span><\/li><\/ul><ul><li><span>The \u2018unauthorized administrators\u2019 report gives you an overview of all local and domain users that are a member of the local admin group on your computers but are not authorized administrators. That way you can make sure that no one in your network has access rights they shouldn\u2019t have.<\/span><span>\u00a0<\/span><\/li><\/ul><p><span>There are hundreds of built-in reports available that can also be customized, to better suit your needs. You can also build your own reports from scratch. The Lansweeper report builder is powered by Microsoft SQL and is supported by extensive documentation to guide you through all available database items.<\/span><span>\u00a0<\/span><\/p><p><span>Can\u2019t find what you need? The Lansweeper forum offers even more reports shared by both Lansweeper techs as well as fellow users along with tips and tricks on how to build your own. The Lansweeper team frequently publishes new reports as a quick response to unexpected cyber security vulnerabilities.\u00a0<\/span><span>\u00a0<\/span><\/p><p><span>While on the road, you may not be able to keep an eye on the latest dashboard updates. Thanks to Lansweeper\u2019s ability to send out email alerts with report results, you can keep all information close at hand and stay on top of changes.\u00a0<\/span><span>\u00a0<\/span><\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"3-control-\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-2593\"><span class=\"eael-accordion-tab-title\">3. Control <\/span><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><\/div><div id=\"elementor-tab-content-2593\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"3-control-\"><p><span>Lansweeper can help you to take control of your IT environment, whether it is just one single device, a group of assets or your entire network.<\/span><span>\u00a0<\/span><\/p><p><span>When opening an individual asset page, a wide range of built-in and customized actions can be found.\u00a0<\/span><span>\u00a0<\/span><\/p><p><span>These actions enable you to remotely perform tasks on this 1 specific device, ranging from a simple ping, over Remote Desktop to rebooting the computer. There are also several custom actions specifically for users, like the option to reset a password.\u00a0<\/span><span>\u00a0<\/span><\/p><p><span>Besides built-in actions, Lansweeper also offers the option to add your own, meaning that the possibilities are endless. If you need inspiration, you can check out Lansweeper forum, for custom actions submitted by fellow users and Lansweeper techs.<\/span><span>\u00a0<\/span><\/p><p><span>Lansweeper also allows you to track dependencies, by linking assets to each other or to users. Monitor and computer relations are automatically defined by Lansweeper, while other relations can be specified when editing the asset. There are several relation types you can choose from and more can be added. This way you can keep track of which devices belong together and which user is currently using them.<\/span><span>\u00a0<\/span><\/p><p><span>In order to keep track of your assets\u2019 physical location, you can upload blueprints of your company building or department floor and place assets on them, creating a convenient map. You can edit your map by selecting the necessary assets from the list and dropping them where they belong.<\/span><span>\u00a0<\/span><\/p><p><span>If you want to take control of your network on a larger scale, Lansweeper\u2019s deployment feature allows you to remotely apply changes to the Windows computers in your network.<\/span><span>\u00a0<\/span><\/p><p><span>A deployment package can make command-line changes on your machines, kill processes, silently install, and uninstall software and run custom scripts.<\/span><span>\u00a0<\/span><\/p><p><span>Lansweeper has several built-in packages to get you started, but you can of course also add your own.\u00a0<\/span><span>\u00a0<\/span><\/p><p><span>On the Lansweeper forum you have access to a whole library of user- and Lansweeper-built packages, all checked and monitored by our dedicated team of admins.\u00a0<\/span><span>\u00a0<\/span><\/p><p><span>These packages can easily be imported into your Lansweeper console. A deployment package consists of one or more steps that, if necessary, can be altered to better suit your needs.<\/span><span>\u00a0<\/span><\/p><p><span>Once your package is ready, you can deploy it on a group, a report, or a manual selection of assets. You can choose to trigger the deployment manually or based on a schedule.<\/span><span>\u00a0<\/span><\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"4-coordinate\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"4\" aria-controls=\"elementor-tab-content-2594\"><span class=\"eael-accordion-tab-title\">4. Coordinate<\/span><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><\/div><div id=\"elementor-tab-content-2594\" class=\"eael-accordion-content clearfix\" data-tab=\"4\" aria-labelledby=\"4-coordinate\"><p><span>Lansweeper you can help coordinate IT work by centralizing all communications in Lansweeper\u2019s built-in Helpdesk, Knowledgebase and Calendar. These tools will help \u2013 to work out projects, plan meetings, and document and share important information.\u00a0<\/span><span>\u00a0<\/span><\/p><p><span>Lansweeper\u2019s <\/span><b><span>Helpdesk<\/span><\/b><span> is a ticket-based system, used to centralize communication. Tickets can be created via email or on the web console. You can also integrate your own workflow and other tools, using Lansweeper\u2019s API.<\/span><span>\u00a0<\/span><\/p><p><span>In the context of the Helpdesk, it is important to note the difference between a regular user and an Agent. By default, anyone in your network is a user. They can only open tickets to ask questions. An Agent on the other hand can both ask questions and reply to other users\u2019 tickets.\u00a0<\/span><span>\u00a0<\/span><\/p><p><span>In the web console\u2019s user interface, users can create tickets and consult them at any time to keep track of their progress. This interface can be customized to reflect your own company branding.\u00a0<\/span><span>\u00a0<\/span><\/p><p><span>When creating a new ticket, it is crucial to fill in a subject and ticket type. Selecting the correct ticket type will guarantee that the ticket will end up in the right hands. The type also determines which custom fields will be offered to the user, to add relevant information.\u00a0<\/span><span>\u00a0<\/span><\/p><p><span>If the ticket is related to a certain device, that asset can be linked to it, so that the Agent can easily find it when he starts working on this request.\u00a0<\/span><span>\u00a0<\/span><\/p><p><span>Once the ticket has been submitted, it will appear in the Agent&#8217;s inbox, where they can pick it up and start working. Certain parameters such as priority and status of the ticket can help your Agents to prioritize and organize their work.\u00a0<\/span><span>\u00a0<\/span><\/p><p><span>While working on a ticket, the Agent can communicate with other Agents, include reminders, and track his own progress using internal notes. These notes are not visible to the user. If the task can\u2019t be finished all at once, he can place a follow-up on the ticket, to finish the job later.\u00a0<\/span><span>\u00a0<\/span><\/p><p><span>When everything is done, he can use a public note to reply to the user and inform them of the result.\u00a0<\/span><span>\u00a0<\/span><\/p><p><span>If any further action needs to be taken, Agents can plan their work in the integrated <\/span><b><span>calendar<\/span><\/b><span>. Calendar events can also be linked to an existing ticket.\u00a0<\/span><span>\u00a0<\/span><\/p><p><span>In the <\/span><b><span>Knowledgebase<\/span><\/b><span> you can document frequently asked questions, known issues and internal procedures to avoid a heap of tickets asking the same questions over and over. These articles can be made accessible to users, creating a single source of information where all employees can easily find solutions for their day-to-day issues.<\/span><span>\u00a0<\/span><\/p><\/div>\n\t\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Back Home DataLeak&amp;Discovery Solutions Endpoint Protector DLP = DATA LOST PREVENTION The plug &amp; play technology allows connecting various portable storage devices, from USB sticks to external hard drives, digital cameras or MP3 players or iPods, to your computer or laptop in a few seconds.\u00a0 Almost all PCs with Windows or Apple MacOS have both [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":10222,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"rs_blank_template":"","rs_page_bg_color":"","slide_template_v7":"","footnotes":""},"class_list":["post-10301","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/convex-network.ro\/en\/wp-json\/wp\/v2\/pages\/10301","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/convex-network.ro\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/convex-network.ro\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/convex-network.ro\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/convex-network.ro\/en\/wp-json\/wp\/v2\/comments?post=10301"}],"version-history":[{"count":0,"href":"https:\/\/convex-network.ro\/en\/wp-json\/wp\/v2\/pages\/10301\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/convex-network.ro\/en\/wp-json\/wp\/v2\/pages\/10222"}],"wp:attachment":[{"href":"https:\/\/convex-network.ro\/en\/wp-json\/wp\/v2\/media?parent=10301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}