Features of BLACKbox Prime T
Innovative Data Centralization for Business Continuity
BLACKbox Prime T is a full-fledged file server. It does what a traditional file server cannot do.
BLACKbox Prime T solves the most common challenge with traditional file servers for data centralization. Traditional file servers configured for data centralization cannot store all data if users do not save files on the file server. Traditionally, users can save (read scatter) data on their local computers. BLACKbox Prime T innovatively forces users to save data on itself so that users are not allowed to save files on any other location but BLACKbox Prime T.
This feature of BLACKbox Prime T ensures that digital assets are not scattered on desktops. This is the first step to achieving business continuity through data preservation. When the enterprise is sure that all its data is centralized in one place, it is straightforward to provide a backup strategy.
Innovative Folder Structure Enforcement for Business Continuity
BLACKbox Prime T solves another of the most common challenges with the traditional file server. BLACKbox Prime T can profile enterprise users to use specific folder structures only. Users can only choose to save data within the defined folder structure. Unlike traditional file servers, it organizes data better in a predefined folder structure.
Vault and Workspace Method for Business Continuity
BLACKbox Prime T provides a vault for archived data for users to reference at any time. It also provides a workspace for ongoing projects. It also provides a moderator role to the user who can transfer finished projects/files/documents to the vault. Users can only refer to data in a vault but can’t change it.
Automatic Backup of Forcefully Centralized Data on Data Center or Media for Business Continuity
All data forcefully centralized on BLACKbox Prime T is backed up on the desired media or data centre. BLACKbox Prime T also takes backup of designated folders from the enterprise’s ERP server. BLACKbox Prime T provides business continuity post-disaster by pushing data to a data centre.
Versioning of Data Backup to minimize the impact of Ransomware or Data Manipulation for Business Continuity
BLACKbox Prime T maintains several versions to support desired media and data centers. Ransomware or any manipulation of data will corrupt the latest version of the data. In such an event, an enterprise can always restore data from the previous version on BLACKbox Prime T or media or data center.
Domain Policies for Information Security
BLACKbox Prime T enforces specific enterprise policies on users so they cannot manage LAN, install new software, or change crucial computer system settings. Instead, they are provided with application rights relevant to their job profile and can compute only to the extent admin has allowed.
Tally Hostable
BLACKbox Prime T can host Tally software which can save significantly on investment in Tally Server Hardware, Windows Server Licenses, and Client Access Licenses. BLACKbox Prime T also takes an automatic backup of the tally installed on itself.
Email Server with Innovative Email Shadowing for Business Continuity
BLACKbox Prime T is a full-fledged mail server with innovative email shadowing technology. Usually, users use email clients in which emails are stored as PST or files. These files are prone to corruption and can cause email data loss. BLACKbox Prime T acts as a full-fledged mail server that shadows every email coming in or going out from itself, that too user-wise and date-wise. So, if the user finds a corrupt PST or such file, the admin can restore all in-out emails in minutes.
Email server with Innovative Vigilance for Information Security
BLACKbox Prime T acts as a full-fledged mail server that provides vigilance controls on email communication. You can define an email user's policy on where they can or cannot send emails and what they can or cannot send to suit your information security requirements.
Email server with Innovative BCC intercept for Information Security
BCC (Blind Carbon Copy) is an easy way to leak data from an enterprise. BLACKbox Prime T intercepts BCC, allows or disallows as per policy, and submits reports to designated users with the content of email and recipients in BCC.
Innovative Dual Password System in Email Server for Information Security
BLACKbox Prime T uses innovative dual password technology to prevent email identity theft-induced fraud.
Innovative USB drive policies with report generation for Information Security
BLACKbox Prime T makes all USB ports of connected computers “smart”. Enterprise can define policy on USB usage for keyboards, Mouse, and printers and deny usage of USB by pen drives, hard drives, and mobile phones on USB. It can also define a policy that data can be brought into the enterprise network over USB but cannot be taken out on USB. It can also define a policy where entrusted users can take data out on USB, but a report is generated and sent to designated users for evidence.
Innovative Screen Capture and Play Back for Fraud Investigation
BLACKbox Prime T can capture screens of every computer and store them for months for future playback. If an enterprise suspects any fraud on a specific computer and wants to play back what happened weeks or months ago, it can do it. This empowers enterprises with the capability to investigate any fraud.
Innovative Happy Hours in Firewall for Information Security
BLACKbox Prime T acts as a firewall for your network and controls users' internet usage. Admin can define internet policies for each user. It also works on the concept of happy hours, which gives users full Internet access during happy hours but also isolates enterprise data so it cannot be infiltrated on the Internet.
Innovative Hybrid Cloud Technology for Laptops and Branch Offices
All the policies can be enforced on laptops and branch office computers not connected with BLACKbox Prime T. However, all the above features can be implemented on Laptops and Branch Computers through agents (client side) and servers (BLACKbox Prime T on cloud).