Skip to content

Control Manager

Pinterest
More Options

Centralized, User-centric Management for Threat and Data Protection

Centralized visibility across multiple layers of security

  • Simplify administration
  • Improve security and compliance
  • Manage consistent data and threat policies
  • Increase visibility with user-centric management

Centralize threat and data protection policy management with a single management console that manages, monitors, and reports across multiple layers of security, as well as across on-premise and cloud deployment models.

Consistent security management will help you bridge the IT silos that often separate layers of protection and deployment models. This type of centralized approach improves protection, reduces complexity, and eliminates redundant and repetitive tasks in security administration—all of which make your organization more secure and your life easier.


Better Protection

Integrate security management and analysis across multiple layers of protection, for both on-premise and cloud deployments

  • Interconnects security layers to defend against advanced threats that exploit multiple threat vectors
  • Unifies policy enforcement for threat and data protection across endpoint, messaging, collaboration, web, and mobile security
  • Improves threat response and investigation to identify and respond to threats as they occur
  • Provides access to actionable threat intelligence
  • Centralizes the identification of botnet and targeted attack command and control (C&C) communications across endpoint, web, data center, and email security products

Improves enterprise-wide visibility

Rapidly understand your security posture, identify threats, and respond to incidents

  • Delivers up-to-the-minute situational awareness across your IT infrastructure
  • Lets you drill-down to the specific information you need with an intuitive, customizable interface for visibility across all security layers and users
  • Gives you the information you need to ensure compliance and facilitate internal IT audit requirement
  • Provides cross-product views of security events and data protection policy violations
  • Improves your ability to identify and respond to threats as they occur

Simplifies security with user-based management

No more console hopping—configure policies from a central console for multiple layers of security

  • Manages threat and data protection for endpoint, messaging, collaboration, web, and mobile security—all from a single pane of glass
  • Easily manages security across all device types with a user-centric view
  • Deploys and reviews policy status for any endpoints owned by a given user


Hardware Requirements

  • At least Intel™ Core™i5 (4 CPU) or equivalent
  • 4GB RAM
  • Disk: SATA II 20GB

 

Software Requirements

Operating System
  • Windows Server 2008 Standard/Enterprise Edition SP1 or later (R2)
  • Windows Server 2008 Web Edition SP1/SP2 (WOW 64-bit)
  • Windows Server 2008 Standard Edition with/without SP1 (R2) (WOW 64-bit)
  • Windows Server 2003 Standard Edition / Enterprise Edition SP1/SP2
  • Windows Server 2003 Standard/Enterprise Edition (R2) SP1/SP2 (WOW 64-bit)
Web Console
  • Microsoft Internet Information Server (IIS) 6.0 (for 2003
  • IIS 7.0 (for 2008
  • IIS 7.5 (for 2008 R2
Database Software
  • Microsoft SQL Server 2005 Express SP2/SP3
  • Microsoft SQL Server 2005 Standard/Enterprise (including 64-bit) SP2/SP3
  • Microsoft SQL Server 2008 Express
  • Microsoft SQL Server 2008 (R2) Standard/Enterprise (including 64-bit) or later
Virtualization Support
  • VMware: ESXESXi Server 3.5, 4.0, 4.1, 5.0; Server 1.0.3, 2; Workstation/Workstation ACE Edition 7.0, 7.1: vCenter™ 4, 4.1, 5; View™ 4.5, 5
  • Citrix: XenServer 5.5, 5.6, 6.0
  • Microsoft: Virtual Server 2005 (R2) with SP1; Windows Server 2008 (R2) 64-bit Hyper-V; Hyper-V Server 2008 (R2) 640-bit
Other
  • Microsoft .NET Framework 3.5 SP1
  • Visual C++ 2005 SP1 Redistribable Package
  • FastCGI 1.5-RTW, 32-bit or 64-bit depending on the system architecture
  • PHP 5.3.5 VC9, 32-bit, Non Thread Safe with the CURL; 32-bit, Thread Safe with the CURL, SOAP, GMP, LDAP, PDO_SQLITE, MCRYPT extensions (excluding PDO_SQLITE_EXTERNAL)
  • Microsoft IIS ASP.Net
  • Microsoft Message Queue
  • Note: Control Manager installs the above components, if they are not installed on the server. However:
    • Microsoft Message Queue must be installed manually for all platforms
    • On Windows server 2008, the following need to be installed manually:
      • .NET Framework 3.x
      • ASP.Net
      • IIS 6 Management compatibility components

Connect with us on