Ascendant NFM

Client-free Network File, Application, and Website Monitoring

Ascendant NFM

While requiring absolutely no software installation on any computer on your network, you can centrally monitor and record every file action that occurs on your network. Every file opening, creation, modification, and deletion is recorded along with the user that performed the action, and when. In addition, Ascendant NFM contains essential logging tools that will log and show you every application and website used by users on your network.

NFM can also archive files when they are altered, and alert you when specific events occur. With NFM, you don’t need to worry about your files security.

  • Overview
  • Feature List
  • Awards
  • Product Uses
Ascendant NFM
Monitor all File, Application, and Website Activity on your Network without any Software Installations – 100% Undetectable.

Ascendant NFM Network File Monitoring

Ascendant NFM represents the latest in cutting-edge network file monitoring security software and asset protection. While requiring absolutely no software installation on any computer on your network you can centrally monitor and record every single file action that occurs on your network. Every file opening, creation, modification, and deletion is recorded along with the user that performed the action, and when. In addition, Ascendant NFM contains essential logging tools that will log and show you every application and website used by users on your network.

Not only can Ascendant NFM monitor and log every file event that occurs on your network, but it can also protect your sensitive data and assets by archiving copies of specified files whenever they are modified, as well as alerting you whenever a user changes or deletes any critical files on your network.

Ascendant NFM

  • Record every file event on your network – all file openings, creations, deletions, and changes

  • Essential application and website logging records what programs and sites users use

  • Archive critical files whenever they are modified by users

  • Receive instant alerts when sensitive data is altered or tampered with in any way

  • Built-in log searching, filtering, and archive viewing for easy data management

  • Comprehensive reporting tools, including top files used and most active users and computers

  • Track user web activity by archiving web content that is downloaded

  • Monitor your entire network from one central location

  • Absolutely no client installations required to monitor a workstation

  • 100% undetectable by users – NFM does not store anything on monitored workstations
Ascendant NFM represents the latest in cutting-edge network security software. While requiring absolutely no software installation on any computer on your network you can centrally monitor and record every single file action that occurs on your network, as well as website and application usage. Every file opening, creation, modification, and deletion is recorded along with the user that performed the action, and when.
Ascendant NFM Network File Monitoring and Logging

Click to view a Screenshot of this featureAre you concerned if sensitive data and assets on your network are being tampered with without your knowledge? Is is possible that network users are leaking information from your network to someone outside? Perhaps they are downloading media files on work time and not staying on task.

Ascendant NFM can log every file action on your network. Every file that is opened, created, modified, or deleted by users will be logged. The full file path along with the user that performed the action, and at the time the action occurred is logged. NFM can show you if sensitive files are being modified, and it can show you everything a user downloads when they think no one is watching. Should you wish to restrict network wide monitoring to only specific files you can use the built-in filtering mechanism that will allow you log only specific files, directories, or file types on your network.

back to top

Ascendant NFM

Ascendant NFM Monitoreo de uso de aplicaciones

Click to view a Screenshot of this featureDo you wonder if employees or network users are installing and running software they should not be? Are they playing games or chatting when they should be working or completing an important task?

Ascendant NFM can log and show you a list of applications each user on your network uses. Each application log includes the name of the user that executed the program, and when they executed it. If your network users are playing games, running chat software, browsing the web, or running legitimate productivity applications you will know. With a single click you can view all applications a selected computer has used (sorted by user), or all applications used on your entire network.

back to top

Ascendant NFM

Ascendant NFM Website Activity Usage Monitoring

Click to view a Screenshot of this featureAre your network users browsing the web during work shifts? Should they be staying on task instead of looking at countless websites? Do you need to know what websites your users are going to?

Ascendant NFM can log every single website event that occurs on your network. Ascendant NFM can log and show you every website users visit with Internet Explorer or Firefox, allowing you to rest easy knowing exactly where your users are going. Website logs can be viewed by computer, or for the entire network in a single click. The website logs will show you what websites were visited by each user on your network computers.

back to top

Ascendant NFM

Ascendant NFM File Archiving and Backup

Ascendant NFMIf you have sensitive data on your network and a malicious user modifies it or deletes it – do you have a copy? Would you like to see a copy of every website users visit while they are supposed to be working? Perhaps you need to track a large project directory and need to have copies of all new files and modifications.

Ascendant NFM can watch over all file events and selectively archive files that you specify to a secure location. NFM can archive files by specific names (such as payroll-records.db), by file extensions (such as .htm or .doc), and even directory paths (such as Temporary Internet Data). NFM can be set to retain the most recent modified copy of each file filter you specify, or it can retain every copy that is made, ensuring data is not lost, and tracks are not covered.

back to top

Ascendant NFM

Ascendant NFM File Alert Notifications

Click to view a Screenshot of this feature Do you have sensitive data that requires your attention in the event that it is modified by a user on your network?

Acting as a data watchdog, Ascendant NFM can passively watch every file event users perform on your network. When a specified file is modified or deleted you can receive an email alert instantly detailing the event that occurred so you can take action. You can specify file alerts by specific file names, file extensions, or directory names.

back to top

Ascendant NFM Comprehensive Reporting Tools

Ascendant NFMDo you need to present log data to a higher up? Or do you just want the ability to quickly see who the most active users are on your network?

Ascendant NFM’s comprehensive reporting tools can generate a handful of unique reports that allow you to easily assess your network data situation without having to pour through thousands of log entries. Reports that NFM can generate are:

  • Complete file usage for selected computers, or all network computers

  • Top files used on selected computers, or all network computers

  • Most active users that are modifying files on your network

  • Most active computers that are modifying files on your network

All reports are generated in a sleek, easy-to-read and print HTML format and can be prepared for specific dates, or all dates logged. Report icons are customizable for company printouts as well.

back to top

Ascendant NFM Centralized Log Viewing and Management

Click to view a Screenshot of this featureAscendant NFM has a built-in log viewer that allows you to view and manage all file usage logs from your network in one location.

Ascendant NFM’s logging capabilities can produce a large amount of data. To make log management easier, all logs for your entire network are viewable simply by selecting one or more (or all) computers and viewing their usage logs with a click of the ‘View’ button. To help you find specific log entries all logs can be searched by time, username, or keyword. Log entries can be filtered by date, also. Once you are done viewing logs, you can use the log archive feature to save logs to a safe place while clearing out your current log-set to make log browsing a more manageable task. All logs – including generated log search results for keywords, dates, users, etc. – can be saved with a click of your mouse for future reference.

back to top

Ascendant NFM

Ascendant NFM Activity Log Email Delivery

Click to view a Screenshot of this featureWould you like to be able to receive email activity logs while you are off-site and are unable to access the NFM logs physically?

Ascendant NFM has the ability to gather up all file usage logs for all network computers and send them to you via email at at time interval you set. All logs are formatted for easy viewing in HTML format. If you are away from the NFM console for an extended period of time you can have NFM clear all activity logs every time it sends you a batch of logs.

back to top

Ascendant NFM

Ascendant NFM No Client Installation Needed, Undetectable

Would you like to be able to monitor your entire network from one central location without having to install software on any of the computers to do it?

Ascendant NFM is unique in that it requires no software installation on any of the computers you wish to monitor – only a username and password for the computer. The only software that is necessary is the main Ascendant NFM program that gets installed on the computer you want to monitor your network from. This means that you can have NFM set up and monitoring your network in minutes – as opposed to having to do a complete roll-out to every workstation, along with applying configurations for each one. NFM’s monitoring is totally undetectable by users.

back to top

Ascendant NFM Easy to Use and Manage

Ascendant NFMAscendant NFM is built with ease-of-use in mind. It’s intuitive user interface effectively ties all of its powerful features together, creating a tool that does not require a ‘learning curve’ to get used to.

Ascendant NFM’s sleek user interface is very easy to navigate and use. All relevant features can be accessed from a list of options. Computers can be added to the monitoring list using the built-in wizards, and can be then edited later on using the same wizards. Log viewing and report generation features are all accessible with a single mouse click on the main interface. No software needs to be installed on monitored computers, so there never is a need to perform an uninstall when you are done monitoring a computer on your network – just delete it from the computer list.

back to top

Ascendant NFM

Ascendant NFM Many More Useful Features

Ascendant NFM has a handful of features not listed above, but are just as useful and important for users.

Settings Importing/Exporting
If you ned to transfer the NFM software to another computer you can quickly export ALL settings for all computers on your network for easy importing to the NFM software installed on another computer.

Password Protected Monitoring
NFM’s monitoring process can be password protected so users that have access to your computer cannot stop its monitoring.

Performance Adjustments, Debug Mode, Customized Log Storage
NFM has a handful of advanced options that let you increase NFM’s performance on slower computers, enable a debug mode for addressing connectivity issues, and even specify a log storage location for all of the NFM logs.

Ascendant NFM

SnapFiles/WebAttack 5 Stars Editor’s Pick Award

Most Downloaded PC Monitoring App in 2002-2004

Ascendant NFM

Download.com 5 out of 5 Review Award

Ascendant NFM

Reviewed by G4 TechTV "ScreenSavers"

Ascendant NFM

Reviewed by ABC Channel 15 (Phoenix, AZ)

Ascendant NFM

Mentioned on NBC News "High Tech Talk"

Ascendant NFM

Mentioned in PC Today

Reviewed by PC Magazine – July 2002

Ascendant NFM

ZDNet Editor’s Pick 5-Star Award (Twice) Reviewers?Raves June 2000

More Awards!

Ascendant NFM

Ascendant NFM

Ascendant NFM pick

Ascendant NFM pick

Ascendant NFM

Ascendant NFM

Ascendant NFM

Ascendant NFM

Ascendant NFM

Ascendant NFM

Ascendant NFM

Ascendant NFM

Ascendant NFM

Ascendant NFM

Ascendant NFM

Ascendant NFM

Ascendant NFM

Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM
Ascendant NFM Network File Monitoring

Can you trust every employee or user on your network? Can you ensure that every user ‘obeys the rules’ and does not try to access files and sensitive data they should not? Are you sure network users are not downloading files that create potential security risks? Are you secure in knowing that employees will never attempt to steal or leak vital corporate data from your network?

If you have any doubts in answering the above questions you may want to read on.

“One of the FBI’s leading agents in the field of computer crime has warned that industrial espionage and targeted data theft are on the increase.

Shena Crowe, InfraGuard co-ordinator for the FBI in the technology heartland of San Francisco, said: “Theft of trade secrets is a very big problem.”

Etiquetas: , , , , , , , ,

Categoría: Content Filtering