Learn More About CTH/BSMS Capabilities

Email Monitoring

Monitor all email and attachments. Encryption method is PKzip. Standard default 8 character dictionary password is 128-bit encryption and by requiring complexity forces it to 256-bit encryption.

Hardware Control

The agent has the ability to control any device(s) plugged into a pc. Force encryption to files being sent to removable drives. Block the usage of, CD/DVD, USB Drives, Infrared, Bluetooth, and Floppy.

Document Protection

With CTH Technologies’ document management software, the administrator can lock down file shares to not only read/write access but block them from moving, copying, attaching, renaming, and printing.

Finger Printing

The agent has the ability to tag documents that are considered sensitive based on their location.  Then based on the keyword, the agent can, block or Force encryption on attachments, block uploads, block printing, block copy/paste, and allow via safe domains.

Website Filtering

The agent has the ability to monitor website usage and access, track or block files from being uploaded, block FTP, and block file downloads. Block websites on a safe list, URL patterns, keywords, meta tags and more.

Application Access

The agent has the ability to block applications based on caption, screen text within a caption, manufacturer name – Software company that created the software (i.e. Adobe), and executable name.