Network Enforcer - Network Security Software
Support Center | About Network Enforcer | Contact
Learn More about Network Enforcer   Buy Network Enforcer Now
Discover how Network Enforcer works. See how Network Enforcer's architecture works to protect your network security at the workplace.

Network Enforcer is separated into two components - the client and the management program - and utilizes a client/server architecture.

The client is the workhorse of the Network Enforcer system. It watches for and enforces filter violations that you have configured. It keeps track of all behavior filter violations, handles the alerts and responses, logs the events, and handles remote commands. The client runs invisibly and cannot be configured or accessed other than from the management program.

The management program is where you specify what computers you want to use Network Enforcer on. It allows you to create and configure filters, perform remote installations, issue remote commands to the computers running the client, create reports, view logs, and more. The client computers can only be configured and accessed from the management program.

Client and Server Architecture

Network Enforcer's architecture allows you to view all computer filter event logs from one central computer. It also allows you to distribute settings and filters to all computers at once, or to specific computers one at a time. Remote commands and real time filter alert responses are sent to each computer from the central computer running the management program. A dedicated server is NOT needed or necessary for Network Enforcer's management program to run on.

Centralized Computer Management Program

Network Enforcer enforces behavior filters you create, allowing you to limit and control what happens on your network, or more specifically, what should NOT happen on your network. Utilizing three levels of security, each with their own thresholds, filters can be created to alert you immediately when specific events happen, or only after they have happened a set number of times. Network Enforcer allows you to be a little more lenient on the employee playing solitaire on their lunch break, while being extremely proactive and reactive on the employee that copies a sensitive file to a thumb drive. You can configure Network Enforcer to monitor all the behaviors below for unwanted events.

Customizable Behavior Activity Filters

Learn More about Network Enforcer   Buy Network Enforcer Now
Below, you'll find all of our Network Enforcer resources.

Network Enforcer

Network Enforcer Features
Network Supervision
Employee Restriction
Respond to Security Alerts
Network Usage Reports
Purchase Network Enforcer

Related Navigation

Network Enforcer Explained
Network Security Benefits
Enforcer Problem Solving
How Enforcer Works
Network Enforcer Uses
Buy Network Enforcer

Help Documentation

Support Center
Network Enforcer FAQ's
Ordering Questions
Licensing Questions

Enforcer Used As

Network Security Software
Intellectual Property
Network Behavior Analysis
Employee Supervising
Network Behavior Controls
Enterprise Network Security
Network Activity Logging

User Testimonials

"Hi Scott. Thanks for all of your support. I wanted to let you know I got Network Enforcer installed last week. Enforcer is powerful! I think we finally know who has been violating our employee policies and snooping around our network. I can't thank you enough! - George Hutcheson"
Network Security Software - Purchase Network Enforcer - How Network Enforcer Works
Network Enforcer © 2007-2012. All Rights Reserved. Legal Policies | Privacy Policy