VLCM works closely with school districts throughout Utah. While working with schools, we see a great need for internet-protection software like ContentProtect. Here is a brief overview of ContentProtect Educational Suite and how it benefits IT departments.
ContentProtect
Manage your company's Internet access, privacy, and applications with ContentProtect Educational Suite
from ContentWatch. ContentProtect Educational Suite includes three powerful functions that will help your company achieve greater employee productivity, protect employer/employee privacy, and manage the applications that employees can run on your computers including:
· Internet filtering through the leading Internet filtering application for small/medium businesses-ContentProtect.
· Application Manager: a new application designed and developed by ContentWatch that allows administrators to control what applications can run on computer systems.
Benefits to IT Departments
Increase Productivity, Decrease Liability
Filter or block any unwanted content that either creates a liability for your organization (pornography, hate mail, etc.) or hurts productivity (shopping, games, entertainment, etc.)
Fully Customizable and Controllable: ContentProtect Educational Suite is highly customizable, permitting Administrators to create organization, group, or individual filtering settings for employees, rather than forcing them into a “one size fits all” scenario like some products do.
Remote Management Dashboard
Allows administrators to view reports, make changes to user’s Internet policies, and permit or terminate Internet access, all from a remote Internet connection. Administrators can also receive email notifications when employees may be trying to access, override, or in some way violate the user’s Internet policy.
Reporting
ContentProtect Educational Suite provides the ability for administrators to view reports anywhere and at any time. Having data stored in the ContentWatch Data Center permits access to online reports from any internet connection. Reporting includes logs of IM traffic, bypass or disable attempts, and more.