TF2000

TF2000

ComputerProx
+
+

Related Products

  • optivalue.ai
    4 Ratings
    Visit Website
  • Carbide
    88 Ratings
    Visit Website
  • Feroot
    30 Ratings
    Visit Website
  • Iru
    1,282 Ratings
    Visit Website
  • Jscrambler
    40 Ratings
    Visit Website
  • Chainguard
    53 Ratings
    Visit Website
  • Proton Drive
    3,602 Ratings
    Visit Website
  • MedTrainer
    242 Ratings
    Visit Website
  • Proton VPN
    41,009 Ratings
    Visit Website
  • Securden Password Vault for Enterprises
    55 Ratings
    Visit Website

About

Easy enough for the self-reliant small business, and powerful enough for the compliance professional. NIST 800-171 contains 110 requirements. Assess your organization to determine where you stand. This is often referred to as a gap analysis or a readiness assessment. Create your system security plan (a formal document describing how you satisfy the 110 requirements) and POA&Ms (remediation plans for the requirements you don't satisfy). Address the requirements you don't satisfy by changing configurations, deploying solutions, or updating your company policies. Keep an eye on your organization, and update your documentation periodically to accurately reflect your security posture. We take security as seriously as you do. Your assessment data is auto-encrypted, keystroke-by-keystroke, with a unique encryption key you generate before it's sent to our servers. ComplyUp can help get you compliant while you still run your business as usual.

About

The ComputerProx TF2000 automates the locking of the PC when you step away. The TF2000 uses ultrasound to detect your presence. When you leave the proximity of the PC, the TF2000 automatically locks the system without requiring any keystrokes from you! No need for awkward timeout settings that mistakenly lock the PC when you are present. The TF2000 can detect your presence and will not lock the system inadvertently. The TF2000 attaches to the PC via the USB port and is configured by the system as a keyboard. Commands are simply sent to the PC as keystrokes therefore no special drivers are required! The individual keystrokes and specified delays are all configurable using our configuration tool. In addition, to the 'walk-away' command, the TF2000 has a 'walk-to' sequence which allows keystrokes to be sent when you approach the PC. For example, under Windows XP the TF2000 sends the CTRL-ALT-DEL sequence when the user approaches the PC. This readies the PC for user authentication.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organizations wanting a tool to simplify their compliance assessment and documentation management processes

Audience

Computer Security solution for IT teams

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$1,800 per year
Free Version
Free Trial

Pricing

$79 one-time payment
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

ComplyUp
United States
complyup.com

Company Information

ComputerProx
www.computerprox.com/products/tf2000.htm

Alternatives

Alternatives

GateKeeper Client

GateKeeper Client

Untethered Labs, Inc.
1TEN

1TEN

1TEN, Inc

Categories

Categories

Computer Security Features

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Integrations

No info available.

Integrations

No info available.
Claim ComplyUp and update features and information
Claim ComplyUp and update features and information
Claim TF2000 and update features and information
Claim TF2000 and update features and information