BLACKbox Twin Prime T

BLACKbox Twin Prime T is developed on the assumption that

  • Every enterprise needs to preserve Digital Assets (documents, spreadsheets, ERP data, drawings, designs, emails)
  • Loss of these digital assets will affect its business continuity and
  • Theft of these digital assets will make enterprises competitively vulnerable.

In nutshell, BLACKbox Twin Prime T is designed to preserve and secure digital assets to ensure business continuity and competitiveness.

BLACKbox Twin Prime T is designed for enterprises wanting to

How does BLACKbox Twin Prime T help enterprises achieve business continuity goals?

BLACKbox Twin Prime T helps organizations achieve business continuity goals by

  • Forced Centralization of Data
  • Automatic Backup and Versioning of Data
  • Pushing the Data-on-Data Center to provide for Disaster Response

How does BLACKbox Twin Prime T help enterprises maintain business continuity in the event of hardware failure?

BLACKbox Twin Prime T helps an organization maintain business continuity even with hardware failure

  • By bundling twin devices of identical configuration over direct network cable connection with real-time syncing of devices
  • By in-built Breath on Breath Technology to instantly switch over to a redundant device in the event of hardware failure of the primary device

How does BLACKbox Twin Prime T help enterprises to ensure competitiveness?

BLACKbox Twin Prime T helps an organization ensure its competitiveness by

  • Protecting Data Theft over USB, Email, or the Internet
  • Enabling organizations to devise systems that can detect Data Theft attempts

Features of BLACKbox Twin Prime T

Breath on Breath Technology

BLACKbox Twin Prime T is a unique hardware designed and supplied in twin mode with two identical devices connected over the direct network cable. They are loaded with Breath-on-Breath technology for real-time data sync, configuration, and firmware updates. In the event of the primary device's hardware failure, the secondary device immediately takes over and maintains the business continuity.

Innovative Data Centralization for Business Continuity

1BLACKbox Twin Prime T is a full-fledged file server. It does what a traditional file server cannot do.
BLACKbox Twin Prime T solves the most common challenge with traditional file servers for data centralization. Traditional file servers configured for data centralization cannot store all data if users do not save files on the file server. Traditionally, users can save (read scatter) data on their local computers. BLACKbox Twin Prime T innovatively forces users to save data on itself so that users are not given a choice to save files in any other location but BLACKbox Twin Prime T. This BLACKbox Twin Prime T feature ensures digital assets are not scattered on desktops. This is the first step to achieving business continuity through data preservation. When an enterprise is sure that all its data is centralized in one place, it is straightforward to provide a backup strategy.
2Innovative Folder Structure Enforcement for Business Continuity
BLACKbox Twin Prime T solves another of the most common challenges with traditional file servers. BLACKbox Twin Prime T can only profile enterprise users to use specific folder structures. Users are allowed to save data within the defined folder structure. Unlike traditional file servers, it organizes data better in the predefined folder structure.
3Vault and Workspace Method for Business Continuity.
BLACKbox Twin Prime T provides a vault for archived data for users to reference at any time. It also provides a workspace for ongoing projects. It also provides a moderator role to the user who can transfer finished projects/files/documents to the vault. Users can only refer to data in the vault but can't change it.
4Automatic Backup of Forcefully Centralized Data on Data Center or Media for Business Continuity
All data forcefully centralized on BLACKbox Twin Prime T is backed up on the desired media or data center. BLACKbox Twin Prime T also takes backup of designated folders from the enterprise's ERP server. BLACKbox Twin Prime T provides business continuity post-disaster by pushing data to the data centre.
5Versioning of Data Backup to minimize the impact of Ransomware or Data Manipulation for Business Continuity
BLACKbox Twin Prime T maintains many versions to backup desired media and the data centre. Ransomware or any manipulation of data will corrupt the latest version of the data. In such an event, the enterprise can always restore data from the previous version on BLACKbox Twin Prime T or media or data centre.
6Domain Policies for Information Security
BLACKbox Twin Prime T enforces specific enterprise policies on users so that they cannot manage LAN, install new software, or change specific computer system settings. Instead, they are provided with application rights relevant to their job profile and can compute only to the extent admin has allowed.
7Tally Hostable
BLACKbox Twin Prime T can host Tally software, saving significantly on investment in Tally Server Hardware, Windows Server License, and Client Access Licenses. BLACKbox Twin Prime T also automatically backs up the tally installed on itself.
8Email Server with Innovative Email Shadowing for Business Continuity
BLACKbox Twin Prime T is a full-fledged mail server with innovative email shadowing technology. Usually, users use email clients in which emails are stored as PST or files. These files are prone to corruption and can cause email data loss. BLACKbox Twin Prime T acts as a full-fledged mail server that shadows every email coming in or going out from itself, that too, user-wise and date-wise. So, if the user finds a corrupt PST or such file, the admin can restore all in-out emails in minutes.
9Email server with Innovative Vigilance for Information Security
BLACKbox Twin Prime T acts as a full-fledged mail server that provides vigilance controls on email communication. You can define an email user's policies on where they can or cannot send an email and what they can or cannot send emails to suit your information security requirements.
10Email server with Innovative BCC intercept for Information Security
BCC (Blind Carbon Copy) is an easy way to leak data from an enterprise. BLACKbox Twin Prime T intercepts BCC, allows or disallows as per policy, and submits reports to designated users with the content of email and recipients in BCC.
11Innovative Dual Password System in Email Server for Information Security
BLACKbox Twin Prime T uses innovative dual password technology to prevent email identity theft-induced fraud.
12Innovative USB drive policies with report generation for Information Security
BLACKbox Twin Prime T makes all USB ports of connected computers "smart." Enterprise can define policy on USB usage for keyboards, mice, and printers and deny usage of USB by pen drives, hard drives, and mobile phones on USB. It can also define a policy that data can be brought into the enterprise network over USB but cannot be taken out on USB. It can also define a policy where entrusted users can take data out on USB, but a report is generated and sent to designated users for evidence.
13Innovative Screen Capture and Play Back for Fraud Investigation
BLACKbox Twin Prime T can capture screens of every computer and store them for months for playback in the future. If an enterprise suspects any fraud on a specific computer and wants to play back what happened weeks or months ago, it can do it. This empowers enterprises with the capability to investigate any fraud.
14Innovative Happy Hours in Firewall for Information Security
BLACKbox Twin Prime T acts as a firewall for your network and controls users' internet usage. Admin can define internet policies for each user. It also works on the concept of happy hours, which gives users full access to the internet during happy hours but also isolates enterprise data so it cannot be infiltrated into the internet.
15Innovative Hybrid Cloud Technology for Laptops and Branch Offices
All the policies can be enforced on laptops and branch office computers not connected with BLACKbox Twin Prime T. However, all the above features can be implemented on Laptops and Branch Computers through agents (client side) and servers (BLACKbox Twin Prime T on the cloud).

Overview

BLACKbox Prime T is developed on the assumption that

  • Every enterprise needs to preserve Digital Assets (documents, spreadsheets, ERP data, drawings, designs, emails)
  • Loss of these digital assets will affect its business continuity and
  • Theft of these digital assets will make enterprises competitively vulnerable.

In a nutshell, BLACKbox Prime T is designed to preserve and secure digital assets to ensure business continuity and Competitiveness.

How does BLACKbox Prime T help enterprises achieve business continuity goals?

BLACKbox Prime T helps an organization achieve business continuity goals by

  • Forced Centralization of Data
  • Automatic Backup and Versioning of Data
  • Pushing the Data-on-Data Center to provide for Disaster Response

How does BLACKbox Prime T help enterprises ensure Competitiveness?

BLACKbox Prime T helps an organization ensure its competitiveness by

  • Protecting Data Theft over USB, Email, or the Internet
  • Enabling organizations to devise systems that can detect Data Theft attempts

Features of BLACKbox Prime T

Innovative Data Centralization for Business Continuity

BLACKbox Prime T is a full-fledged file server. It does what a traditional file server cannot do.

BLACKbox Prime T solves the most common challenge with traditional file servers for data centralization. Traditional file servers configured for data centralization cannot store all data if users do not save files on the file server. Traditionally, users can save (read scatter) data on their local computers. BLACKbox Prime T innovatively forces users to save data on itself so that users are not allowed to save files on any other location but BLACKbox Prime T.

This feature of BLACKbox Prime T ensures that digital assets are not scattered on desktops. This is the first step to achieving business continuity through data preservation. When the enterprise is sure that all its data is centralized in one place, it is straightforward to provide a backup strategy.

Innovative Folder Structure Enforcement for Business Continuity

BLACKbox Prime T solves another of the most common challenges with the traditional file server. BLACKbox Prime T can profile enterprise users to use specific folder structures only. Users can only choose to save data within the defined folder structure. Unlike traditional file servers, it organizes data better in a predefined folder structure.

Vault and Workspace Method for Business Continuity

BLACKbox Prime T provides a vault for archived data for users to reference at any time. It also provides a workspace for ongoing projects. It also provides a moderator role to the user who can transfer finished projects/files/documents to the vault. Users can only refer to data in a vault but can’t change it.

Automatic Backup of Forcefully Centralized Data on Data Center or Media for Business Continuity

All data forcefully centralized on BLACKbox Prime T is backed up on the desired media or data centre. BLACKbox Prime T also takes backup of designated folders from the enterprise’s ERP server. BLACKbox Prime T provides business continuity post-disaster by pushing data to a data centre.

Versioning of Data Backup to minimize the impact of Ransomware or Data Manipulation for Business Continuity

BLACKbox Prime T maintains several versions to support desired media and data centers. Ransomware or any manipulation of data will corrupt the latest version of the data. In such an event, an enterprise can always restore data from the previous version on BLACKbox Prime T or media or data center.

Domain Policies for Information Security

BLACKbox Prime T enforces specific enterprise policies on users so they cannot manage LAN, install new software, or change crucial computer system settings. Instead, they are provided with application rights relevant to their job profile and can compute only to the extent admin has allowed.

Tally Hostable

BLACKbox Prime T can host Tally software which can save significantly on investment in Tally Server Hardware, Windows Server Licenses, and Client Access Licenses. BLACKbox Prime T also takes an automatic backup of the tally installed on itself.

Email Server with Innovative Email Shadowing for Business Continuity

BLACKbox Prime T is a full-fledged mail server with innovative email shadowing technology. Usually, users use email clients in which emails are stored as PST or files. These files are prone to corruption and can cause email data loss. BLACKbox Prime T acts as a full-fledged mail server that shadows every email coming in or going out from itself, that too user-wise and date-wise. So, if the user finds a corrupt PST or such file, the admin can restore all in-out emails in minutes.

Email server with Innovative Vigilance for Information Security

BLACKbox Prime T acts as a full-fledged mail server that provides vigilance controls on email communication. You can define an email user's policy on where they can or cannot send emails and what they can or cannot send to suit your information security requirements.

Email server with Innovative BCC intercept for Information Security

BCC (Blind Carbon Copy) is an easy way to leak data from an enterprise. BLACKbox Prime T intercepts BCC, allows or disallows as per policy, and submits reports to designated users with the content of email and recipients in BCC.

Innovative Dual Password System in Email Server for Information Security

BLACKbox Prime T uses innovative dual password technology to prevent email identity theft-induced fraud.

Innovative USB drive policies with report generation for Information Security

BLACKbox Prime T makes all USB ports of connected computers “smart”. Enterprise can define policy on USB usage for keyboards, Mouse, and printers and deny usage of USB by pen drives, hard drives, and mobile phones on USB. It can also define a policy that data can be brought into the enterprise network over USB but cannot be taken out on USB. It can also define a policy where entrusted users can take data out on USB, but a report is generated and sent to designated users for evidence.

Innovative Screen Capture and Play Back for Fraud Investigation

BLACKbox Prime T can capture screens of every computer and store them for months for future playback. If an enterprise suspects any fraud on a specific computer and wants to play back what happened weeks or months ago, it can do it. This empowers enterprises with the capability to investigate any fraud.

Innovative Happy Hours in Firewall for Information Security

BLACKbox Prime T acts as a firewall for your network and controls users' internet usage. Admin can define internet policies for each user. It also works on the concept of happy hours, which gives users full Internet access during happy hours but also isolates enterprise data so it cannot be infiltrated on the Internet.

Innovative Hybrid Cloud Technology for Laptops and Branch Offices

All the policies can be enforced on laptops and branch office computers not connected with BLACKbox Prime T. However, all the above features can be implemented on Laptops and Branch Computers through agents (client side) and servers (BLACKbox Prime T on cloud).