Security Extended to Skype for Business Chat and IM
Philadelphia, PA June 18, 2018
Pearl Software has released Version 12 R3 of its enterprise-class Internet monitoring and web filtering product line. This latest release extends Pearl Software’s Echo cybersecurity technology to Skype for Business. Focusing on enterprise customers, Echo’s data leak prevention (DLP) for Skype can accommodate Microsoft Lync installations as well as Skype used as part of the Microsoft Office 365 offering. Echo provides administrators with full insight into encrypted Skype Chat and IM communications without jeopardizing the integrity of the communication’s security or the quality of voice and video services. More about this topic...
March Madness activities in the workplace can affect employee morale in a positive way. The multi-weeklong event has a way of getting employees involved with one-another in a non-work-related activity. On the other side of the equation, the cost of lost productivity will balloon as workers spend more than an hour streaming, filling out brackets or just discussing the games with co-workers.
Pearl Echo allows you to align your organization’s Internet access rights with your company’s culture. With Pearl Echo you can easily allow full and monitored access to March Madness content or completely lock down all gaming and sports content sites. You can also strike a balance and allow access to content during lunch and off hours on a user, group or company-wide basis.
Pearl Echo allows you to set software rules that mesh with your company culture; not force your company culture to fit how a web-filtering program is designed.
Check out a full version with our latest features here: pearlsoftware.com/products
Pearl Echo expands web filter technology to lock-in adult content filters provided by popular web search sites.
Philadelphia, PA (PRWEB) July 11, 2017
Pearl Software, the inventors of real-time, mobile Internet monitoring and web filtering has released Safe Search enforcement as a component of its web filtering capabilities. Google, Bing and Yahoo Search provide optional search settings to filter out inappropriate and adult-oriented content from their search results. Pearl Software’s latest Echo cybersecurity products ensure Safe Search is enabled and not circumvented by the end user.
“Using their web browsers, end users have the ability to easily disable their search engine’s Safe Search setting,” said Pearl Software CTO, Joe Field. “Because Pearl Echo does its work on the user’s device down at the network layer, Pearl Echo can be configured to override the user's settings, ensuring that Safe Search remains on.” Safe Search uses the search provider’s proprietary technology to filter a fair amount of inappropriate material and adult content. For this reason, Safe Search enforcement is just one aspect of Pearl Echo’s blended approach to web filtering. More about this topic...
New Web Filter Technology tests encryption strength, ensuring a safer browser experience.
Philadelphia, PA (PRWEB) May 02, 2017
Pearl Software, the creator of real-time, mobile Internet cybersecurity has released HTTPSafety.Check as part of its web filtering platform. A vast number of web servers that offer weak encryption are vulnerable to attack making protected data transfer susceptible to prying eyes. Pearl Echo’s HTTPSafety.Check blocks sites that don’t maintain a current and strong level of encryption, ensuring a safer browser experience. More about this topic...
New Web Filter Technology Helps Management Focus on Internet Usage Trends
Exton, PA (PRWEB) March 28, 2017
Pearl Software, the creator of real-time, mobile Internet monitoring and web filtering has released Echo Smart.Capture as part of its cybersecurity product line. Pearl Echo Version 12 R2 now includes the ability to monitor a user’s web browsing while filtering out non-pertinent traffic. Echo Smart.Capture uses heuristics to determine what monitored activity is user-based versus activity such as advertisements, style content or Facebook and Twitter tie-ins that a site may use in rendering content in a web browser. More about this topic...
Echo Cybersecurity Extends Encryption Monitoring to Remote Desktop Services
Exton, PA (PRWEB) February 27, 2017
Pearl Software released Pearl Echo Version 12 R2, its flagship Internet monitoring and web filtering product. This latest release extends Pearl Echo’s Crypto.View™ technology to work in a multi-user and server-centric environment like Microsoft’s Remote Desktop Services (RDS) and Citrix’s XenServer. Echo Crypto.View provides administrators with full insight into encrypted communications including secure web (HTTPS) as well as secure email (SSL/TLS). Pearl’s patented real-time cyber threat suite includes the ability to monitor and control Internet communications that have been protected with encryption without jeopardizing the integrity of communication security. More about this topic...
Pearl Software adds support for administrators who are responsible for aligning cybersecurity policy with product capabilities.
Philadelphia, PA – December 8, 2016. Pearl Software's new NIST Guide provides organization policymakers with a road-map for satisfying portions of the Protect, Detect and Respond Functions of the NIST Framework for Improving Critical Infrastructure Cybersecurity. The Pearl Software NIST Guide fully supports an administrator’s efforts in documenting their cyber security policy. The NIST Framework helps organizations align their cybersecurity activities with their business requirements, risk tolerances and resources. The Pearl Software NIST Guide provides a tool to match Pearl Software’s cyber security product capabilities to NIST Framework categories. More about this topic...
Advanced Research of Technologies, Inc. to distribute Pearl Echo in Japan
Exton, PA – November 17, 2016 – Pearl Software, Inc. announced today it has entered into a distribution agreement with Advanced Research of Technologies, Inc. (ART). ART will distribute Pearl Software’s Internet visualization and filtering products in Japan. Pearl Software is an industry leader in the cyber security space and holds several patents for its ground breaking real-time, remote Internet monitoring and control technologies.
“Pearl Software is a leader in the US cyber security market and I believe that the products are going to be the industry standard in Japan based on their unique approach to securing user Internet access. We are pleased to provide our partners and the market with comprehensive Internet visualization and filtering solutions with the complete line of Pearl Software's products," said Yasunobu Kudo, president and CEO of ART. More about this topic...
The National Institute of Standards and Technology has published a self-assessment tool designed to help organizations gauge the impact and effectiveness of their cybersecurity risk management initiatives. The NIST Framework for Improving Critical Infrastructure Cybersecurity (the “Framework”) enables organizations to apply the principles and best practices of risk management to improving the security and resilience of critical infrastructure. The Framework is not intended to be a one-size-fits-all solution to cybersecuirity. Rather, the Framework will help an organization align its cybersecurity activities with its business requirements, risk tolerances, and resources.
Pearl Echo helps organizations satisfy portions of the Protect, Detect and Respond “Functions” of the Framework by focusing on the following Framework “Categories”: More about this topic...
Video conferencing, once the purview of the Fortune 500, has become ubiquitous thanks to the popularity of Skype and Facetime. But with most things Internet, there are frequently unintended consequences. Welcome the latest scam: The Romance Extortion.
In this scam, the target is lured into participating in cyber-sex using a webcam. The scammer records the video session and uses it to blackmail the target. Who would fall for that? Welcome Nebraska State Senator Bill Kintner.
Sen. Kintner began messaging with a woman who contacted him via his Facebook page. Their interaction grew over time from casual, to explicit, to the point where the woman convinced the married senator to contact her on Skype. While on travel, the senator used his state-issued laptop to engage in video cyber-sex. The woman soon after threatened to release the captured video unless the senator acquiesced to her extortion demands. Realizing he blew it, the senator decided to come clean and report his activity to state officials. Public officials in Nebraska who misuse state property can be charged with a misdemeanor. Sen. Kintner, perhaps due to his position, got off easy by paying a $1000 fine. More about this topic...