InterGuard deploys and updates without requiring end-user involvement. Its small client footprint and low memory utilization do not impact end-user function or performance. InterGuard is installed silently and invisibly using any preferred software deployment tool. After that, InterGuard runs undetectably, so users won’t notice it operating on their computers, or be able to uninstall or disable it. InterGuard can be deployed in any size organization or government agency. All parameters can be customized. InterGuard is managed from a single management console, simplifying deployment and decreasing administration costs. This console provides detection, blocking, logging, auditing and alerting.

InterGuard is built on Awareness Technologies’ patented Single Agent technology. Once installed on each client computer, it operates invisibly and undetectably, executing locally all the functions of the software. This computing delivers high performance on each client without impacting the corporate network. The agent communicates using secure internet protocol, allowing all data to be accessed and settings configured using any web browser.

InterGuard delivers high performance on each client without impacting the corporate network.

InterGuard can operate either on a dedicated server within your organization, or on a fully-hosted central management and service provisioning platform. Delivered as a “Software-as-a-Service” (SaaS), it features an intuitive, Web-based user interface and uses robust and resilient fully-hosted architecture to support the management and protection of confidential data within your organization. InterGuard can easily be integrated with existing back-office systems to support existing business processes and provide a host of capabilities specifically tailored to increase the security of your data, all with minimal upfront investment and low administrative and support costs.

InterGuard generates comprehensive high-level reports on your organization’s computer activity, including on individual employees. This provides management and IT administrators with insight into whether or not employees are complying with security policy, and furthermore identify potential risks to confidential data. The reports provide valuable forensics through InterGuard’s log data and distributed infrastructure. This data provides security managers with knowledge about the nature of internal threats and potential responses, enhancing their understanding and control over internal challenges to the organization’s data.