Your Cybersecurity Solution for Internet Monitoring and Web Filtering

Pearl Echo.Suite is not effected by Internet application changes since it does it's work at the protocol level. Pearl Echo.Suite provides advanced employee Internet monitoring, filtering and management capabilities allowing you to enhance productivity and protect and conserve resources. Pearl Echo's patented cybersecurity technology enables you to maintain the continuity of your Internet usage policies beyond your company’s internal network. Pearl Echo.Suite allows you to manage:

Web Filtering World Wide Web

E-mail Filtering E-mail

Skype IM Filtering Skype Instant Messaging & Chat

News Filtering News Group Postings

FTP Filtering File Transfers / Downloads

Bandwidth Monitoring Bandwidth Consumption

ssl filtering Secure Web (HTTPS)

Web Mail Blocking Web-based E-mail

Web Chat Blocking Web-Chat Rooms

Terminal Server Filtering MS RDS/Terminal Server Apps

Citrix Server Filtering Citrix XennApp

Application Control Application Access

Pearl Echo's Quick Link™ feature restores the text of incoming and outgoing E-mail, News, Skype Chat and IM conversations, allowing you to maintain a history of all Internet activity for real time content review.

Enterprise-Ready

Pearl Echo.Suite was designed with the enterprise in mind. The Pearl Echo.Suite Report Manager consists of over seventy five standard reports that can be customized for your existing Domain users and groups. Pearl Echo.Suite analytics allows you to run reports interactively or to schedule reports to be automatically generated and distributed. For big data and additional analytics, Pearl Echo.Suite optionally integrates with MS SQL Server. If your organization includes a server-centric computing environment, keep in mind that Pearl Echo.Suite is the only Internet management software that is certified and fully functional in a Citrix & Microsoft Terminal Services environment.

Grows with your Business

Pearl Echo.Suite is packed with features for the large enterprise but remains based upon the core needs of your growing business. Features like automated deployment, an intuitive standards-based administration console, server-optional setup and self-administering workstation agents allow Pearl Echo.Suite to meet the needs of any size organization.

Protects

Pearl Echo.Suite cybersecurity features include keyword and text pattern blocking which helps safeguard against the dissemination of personal or confidential information. Keyword checks extend to all supported e-communications - even to encrypted and encoded e-mail attachments. Pearl Echo.Suite acts as the enforcement behind your organization's Acceptable Use Policy. All communications can be a archived for rapid retrieval, protecting organizations from laws suits related to false termination, discrimination-based claims and regulation compliance.

Controls

Pearl Echo.Suite provides a host of cybersecurity controls that can be finely tuned to your specific needs. Your custom controls, allow and block lists, linguistics, URL filters, bandwidth and time controls can all be used simultaneously and in concert with one another.

Network-Ready Out-of-the-Box

Managed users can be connected to your local area network, wide area network, or be completely detached from your private network. Pearl Echo.Suite runs as an independent service eliminating reliance on legacy proxy servers or integration issues with firewalls or multiple subnets. Pearl Echo's architecture scales well and allows you to monitor any form of Internet connection - anywhere. Pearl Echo.Suite applies your cybersecurity rules by Windows user, group and computer names. Administration is streamlined by optionally integrating into your Windows Domain or Stand-alone server structure. Unlimited cybersecurity Profiles can be created to provide varying levels of management for your existing directory of users, groups and computers.

 

 

 

 

Related Links

Download a Free Trial ...to get a hands-on look at Pearl Echo's features and functions

Start the Pearl Echo.Suite Product Video Tour ...to get a quick look at Pearl Echo's capabilities without installing.

View Pearl Software vs. Competition  ...to see how Pearl Software stacks up to the competition.

Request a Quote  ...to receive personalized pricing that matches your requirements.