Use Cases

Interfocus Provides Operational Visibility Through Vital IT Management Capabilities in a Single Solution.

See How Interfocus Provides Visibility, Control and Compliance

Insider Threat

Insider Threat

USB Management

USB Management

Print Monitoring

Print Monitoring

Audit Compliance

ITAR Compliance

User Behavior Analysis

Employee Monitoring

Insider Threat
Mitigation Is Key in the First 24 Hours from Detection
Insider Threat
Interfocus ATP combines the advanced threat detection benefit of Cylance’s market leading endpoint protection with Interfocus’s proven enterprise security management to deliver a complete threat protection and response solution for connected and “air gapped” systems.

With Interfocus, you can:
  • Detect and quarantine threats at the endpoint
  • Conduct a digital investigation to determine the source of malware and the extent of exposure
  • Stop malware from reoccurring by applying vital patches and policy changes

With Interfocus, you benefit
  • Gain visibility into the malware kill chain and apply patches to stop malware
  • Investigate malware source by reviewing user activities surrounding detection
  • Manage thousands of Cylance endpoint agents—connected or air gapped (view agent mode, upgrade agents as needed, update associated policies and send threat alert notifications)
USB Management
Reduce Security Risks & Detect Fraudulent Activity
USB Management
USBs are an extremely useful, cost-effective tool for storing and sharing data. But for IT administrators, USBs can cause a host of problems as they are hard to manage and secure. USBs easily allow your company’s sales materials, customer contacts, creative files, and product specifications to be shared on the fly.

With Interfocus, you can:
  • Identify what files are being copied to and from USB storage devices
  • Set user permissions that allow certain users to use specific USB memory devices and/or prohibit read/write operations.
  • Control the use of CD/FD/USB/SD memory and/or other devices including Wi-Fi/ Bluetooth connections.
  • Detect fraudulent activities early. Detect USB devices in use and determine how long the devices have been idle.
  • See what is happening throughout your network so you can take immediate corrective action if needed.

With Interfocus, you benefit
  • Increase security. Take action against insider threats (both unintentional and malicious).
  • Reduce risk. Reduce overall business risk by addressing a risk historically identified as the leading cause of security breaches.
  • Increase productivity. Increase productivity when users know they are being monitored.
Print Monitoring
Collect, Report, Audit & Manage Printer Logs
Business Technology
Whether it’s unattended prints that are grabbed up by unscrupulous contractors, or printouts handed over by a malicious user, employees’ print behavior may be putting your company at risk.

With Interfocus, you can capture:
  • Printer name and IP address
  • Document name (which can be flagged if a custom keyword is included and a notice can be sent to the admin and/or end users)
  • When the document was printed and by whom
  • Number of pages
  • Document body (optional)

With Interfocus, you benefit

Reduce the risk of security breaches with Interfocus Print Monitoring.

By tracking print activity at endpoints in your network, you can monitor what’s being printed, on which devices, and by whom. You can even receive notifications if sensitive documents containing flagged keywords are printed.

ITAR Compliance
Control & Stop Access to Proprietary Information
ITAR Compliance
ITAR regulations dictate that defense contractors must put in place controls to ensure that access to proprietary information is monitored and that all unauthorized access must be reported. Interfocus provides a robust endpoint monitoring and management platform that protects the enterprise’s data assets at scale.

With Interfocus, you can:
  • View, manage and control USB usage and compliance across the network. (USB Usage)
  • View a log of all user activity across the network. See which files were accessed, how they were used, and where they were copied. (File Tracking)
  • Detect, mitigate and protect threats. (Lifecycle Management)

With Interfocus, you benefit

Protect against insider threats and gain visibility into who accesses what within the network with Interfocus.

Monitor the user’s actions, the network devices activity, and your data directory. Comply with ITAR regulations that require defense contractors put in place controls to ensure that access to proprietary information is monitored and that all unauthorized access must be reported.

Employee Monitoring
Enforce Policy & Track Employee Activities
Employee Monitoring
Your employees have anytime, anywhere access to your business network. Understand how work gets done. Uncover which non-work distractions are costing you productivity. Monitor employee activity with Interfocus. Ensure that everyone in your organization is complying with your policies and best practices through detailed logs of all user and asset activity. With regular scans of devices, hardware and software versions in use, you can block unauthorized applications from executing.

With Interfocus, you can:
  • Monitor, manage and log web access, applications run and for how long on endpoints
  • Block unauthorized or custom application from executing
  • Manage data export policies to include document uploading, downloading, and websites data entry
  • Manage cloud email access and collect information on sent emails with detailed information including attachments (Gmail, Outlook.com and Outlook Web App)
  • Provide detailed user behavior analytics and provide detailed audit trail reports for identified employees

With Interfocus, you benefit
  • Easily enforce policy. Record and alert inappropriate website use and limit access to unapproved sites. You can block a variety of actions, such as uploading, downloading, or writing to websites, based on keywords or URLs.
  • Monitor printing logs including document name, PC, person, and printer for data loss awareness.
  • Deter malicious activities. Sometimes the fact that employees know they are being monitored is simply enough. Interfocus makes it possible to monitor web access to grasp who accesses which websites and how long web users spend on said websites.
  • Pinpoint data breaches. Audit logs include website activity, printing logs (including document name, PC, person, and printer), email activity, and more!
Schedule a Demo