1Turbo T is a full-fledged file server. It does what a traditional file server cannot do.
BLACKbox Turbo T solves the most common challenge with traditional file servers for data centralization. Traditional file servers configured for data centralization cannot store all data if users do not save files on the file server. Traditionally, users can save (read scatter) data on their local computers. BLACKbox Turbo T innovatively forces users to save data on itself so that users are not allowed to save files on any other location but BLACKbox Turbo T.
This feature of BLACKbox Turbo T ensures digital assets are not scattered on desktops. This is the first step to achieving business continuity through data preservation. When an enterprise is sure that all its data is centralized in one place, it is elementary to provide a backup strategy.
2Innovative Folder Structure Enforcement for Business Continuity
BLACKbox Turbo T solves another common challenge with traditional file servers. BLACKbox Turbo T can profile enterprise users to use specific folder structures only. Users are allowed to save data within the defined folder structure. Unlike traditional file servers, it organizes data better in a predefined folder structure.
3Vault and Workspace Method for Business Continuity.
BLACKbox Turbo T provides a vault for archived data for any time reference for the users. It also provides a workspace for ongoing projects. It also provides a moderator role to the user who can transfer finished projects/files/documents to the vault. Users can only refer to data in the vault but can't change it.
4Automatic Backup of Forcefully Centralized Data on Data Center or Media for Business Continuity
All data forcefully centralized on BLACKbox Turbo T is backed up on desired media or data center. BLACKbox Turbo T also takes backup of designated folders from the enterprise's ERP server. By pushing data to the data center, BLACKbox Turbo T provides business continuity post-disaster.
5Versioning of Data Backup to minimize the impact of Ransomware or Data Manipulation for Business Continuity
BLACKbox Turbo T maintains several versions for the backup on desired media and the data center. Ransomware or any manipulation of data will corrupt the latest version of the data. In such an event, the enterprise can always restore data from the previous version on BLACKbox Turbo T or media or data center.
6Domain Policies for Information Security
BLACKbox Turbo T enforces specific enterprise policies on users so that they cannot manage LAN, cannot install new software, and cannot change specific crucial system settings of the computer. Instead, they are provided with application rights relevant to their job profile and can compute only to the extent admin has allowed.
7Tally Hostable
BLACKbox Turbo T can host Tally software, saving significantly on investment in Tally Server Hardware, Windows Server Licenses, and Client Access Licenses. BLACKbox Turbo T also takes an automatic backup of the tally installed on itself.
8Email server with Innovative Vigilance for Information Security
BLACKbox Turbo T acts as a full-fledged mail server that provides vigilance controls on email communication. You can define an email user's policies on where they can or cannot send an email and what they can or cannot send emails to suit your information security requirements.
9Email server with Innovative BCC intercept for Information Security
BLACKbox Prime T acts as a full-fledged mail server that provides vigilance controls on email communication. You can define an email user's policies on where they can or cannot send an email and what they can or cannot send emails to suit your information security requirements.
10Email server with Innovative BCC intercept for Information Security
BCC (Blind Carbon Copy) is an easy way to leak data from an enterprise. BLACKbox Turbo T intercepts BCC, allows or disallows as per policy, and submits reports to designated users with the content of email and recipients in BCC.
11Innovative Dual Password System in Email Server for Information Security
BLACKbox Turbo T uses innovative dual password technology to prevent email identity theft-induced fraud.
12Innovative USB drive policies with report generation for Information Security
BLACKbox Turbo T makes all USB ports of connected computers "smart." Enterprise can define policy on USB usage for keyboards, mice, and printers and deny usage of USB by pen drives, hard drives, and mobile phones on USB. It can also define a policy that data can be brought into the enterprise network over USB but cannot be taken out on USB. It can also define a policy where entrusted users can take data out on USB, but a report is generated and sent to designated users for evidence.
13Innovative Screen Capture and Play Back for Fraud Investigation
BLACKbox Turbo T can capture screens of every computer and store them for months for playback in the future. If an enterprise suspects any fraud on a specific computer and wants to play back what happened weeks or months ago, it can do it. This empowers enterprises with the capability to investigate any fraud.
14Innovative Happy Hours in Firewall for Information Security
BLACKbox Turbo T acts as a firewall for your network and controls internet usage for users. Admin can define internet policies for each user. It also works on the concept of happy hours, which gives users full access to the internet during happy hours but also isolates enterprise data so it cannot be infiltrated into the internet.
15Innovative Hybrid Cloud Technology for Laptops and Branch Offices
All the policies can be enforced on laptops and branch office computers which are not connected with BLACKbox Turbo T. However, all the above features can be implemented on Laptops and Branch Computers through agents (client side) and servers (BLACKbox Turbo T on a cloud).