Endpoint Customization
Kiosk Mode
Lockdown any Windows computer to perform only the functions you need and prevent unauthorized usage

Transform a computer into a Kiosk within minutes
Run designated application in full screen and block access to Operating System and Desktop
Ensure computers are dedicated to their intended use

Kiosk Mode

Allow the creation of a typical configuration for various usage scenarios such as public kiosks, library computers and learning environments with builtin Kiosk mode.

Control User Experience

Provides the ability to control various aspects of the user experience and prevent unauthorized actions.

Minimize IT Intervention

Provide only the intended Windows functionality to end users, thereby reducing issues caused by tampering with system settings.

Secure Workstations

Make workstations secure by providing the ability to disable or prevent saving data to USB drives, disk drives, network and web-based storage.

 

Transform a computer into a Kiosk within minutes
Transform a computer into a Kiosk within minutes
  • Restrict functionality and control various aspects of user experience and prevent unauthorized actions on public access computers.
  • Block everything except the trusted application in Kiosk mode including the start menu, taskbar and desktop.
  • Ensure the computers are dedicated to their intended use.
  • Create fixed user sessions where the user is forced to logoff after a limited time.

User session management with easy to use web-based console
User session management with easy to use web-based console
  • Create fixed user sessions where the user is forced to logoff after a limited time and control user access using security codes.
  • Block untrusted applications and ensure the computer can be used only for the activity it was intended for as per your organization’s security standards.
  • Secure your computers by creating a list of allowed or restricted websites and network locations to prevent data theft.

Ensure computers are dedicated to their intended use
Ensure computers are dedicated to their intended use
  • Launch only predetermined applications upon start up with in-built Kiosk mode functionality.
  • Secure your computers by creating a list of allowed or restricted websites and network locations to prevent data theft.
  • Restrict browsers or disable browser features to control user actions and increase security.
  • Get complete security with user access controls without implementing GPOs.
Block unauthorized executables
Ensure only approved applications are allowed to run on a computer
Block unknown threats that can bypass antivirus solution
Cutting Edge Security

Protect users from unknown threats such as zero-day attacks, mutating malware, advanced persistent threats and sophisticated attacks.

Granular Control

Allow organizations to enjoy the benefits of application control such as publisher-based approvals, policy-based control, and protection at the local machine level.

Boost IT Productivity

Accelerate IT productivity with an automated initial set-up, standardized configuration, central management, and reduced IT support tickets.

Manage with a Central Console

Allow the creation of policy-based user groups customized for different computer usage needs, ensure operational savings.

 

Blocking unauthorized executables
Blocking unauthorized executables
  • Enforce a multi-layer security using Application Control, file signature, publisher, and user types for complete protection.
  • Protect your IT assets from zero day threats and reverse any malicious changes to systems.
  • Monitor violations on all computers across your network with detailed reports of blocked programs, programs causing the most violations, and computers where most violations occur.

Ensure only approved applications are allowed to run on a computer
Ensure only approved applications are allowed to run on a computer
  • Identify and controls what applications are currently running in your IT environment or can be added to your IT environment.
  • Automatically identify trusted software that is authorized to run and prevent all other applications from executing – whether they are malicious, untrusted or merely unwanted.
  • Monitor your endpoints with real-time alerts and reporting on threats to your network.

Block unknown threats that can bypass antivirus solution
Block unknown threats that can bypass antivirus solution
  • Eliminates unknown or unwanted applications in your network, reducing the risk and cost of malware, and ultimately improving network stability.
  • Identify all applications running within the endpoint environment.
  • Protect against exploits of un-patched OS and 3rd party application vulnerabilities.
  • Monitor, track, analyze, and take action with detailed reporting and alerts.
Simplify administering of GPOs
Protect workstations and control user experience
Prevent data leakage and secure your environment
We Protect All Types of Windows Computers
Kiosk Machines

Restrict functionality and control various aspects of user experience and prevent unauthorized actions on public access computers.

User Computers

Allow users to access only a pre-defined set of Windows functionality thereby avoiding issues caused due to system tampering.

Configure without Group Policies

Quickly configure and restrict Windows environments without learning complex Group Policies.

Public Access Computers

Secure public access computers by preventing users from saving data to USB drives, disk drives, network or web-based storage.

 
Easily lockdown and control Windows experience for your Enterprise

Run PCs in Kiosk Mode
Run PCs in Kiosk Mode

Faronics WINSelect simplifies Kiosk functionality:

  • Run computers in Kiosk Mode by allowing the trusted application to launch in full screen mode.
  • Block everything except the trusted application in Kiosk mode including the start menu, taskbar and desktop.
  • Create fixed user sessions where the user is forced to logoff after a limited time.

Browser and Desktop Lockdown
Browser and Desktop Lockdown

Easily turn on and off Windows features:

  • Ensure data security by limiting printing or setting a printing quota.
  • Prevent users from copying data to a particular drive, partition or a USB drive.
  • Block untrusted applications and ensure the computer can be used only for the activity it was intended for as per your organization’s security standards.

Restrict website and network access
Restrict website and network access

Get complete security with user access controls:

  • Secure your computers by creating a list of allowed or restricted websites and network locations to prevent data theft.
  • Restrict browsers or disable browser features to control user actions and increase security.

Set time periods for user session management
Set time periods for user session management

Easily turn on or off Windows features:

  • Create fixed user sessions where the user is forced to logoff after a limited time and control user access using security codes.
  • Block untrusted applications and ensure the computer can be used only for the activity it was intended for as per your organization’s security standards.
  • Secure your computers by creating a list of allowed or restricted websites and network locations to prevent data theft.

On-Premise and Cloud Solution
On-Premise and Cloud Solution

Maximise Your IT Investments with choice of platform:

  • Centrally deploy, configure and manage multiple computers with ease from an on premise or a Cloud management console.
  • Quickly configure and restrict Windows environments without learning complex Group Policies or requiring expensive hardware or server technologies.
SALES INQUIRIES
1-800-943-6422
Contact Us

TECH SUPPORT
1-800-943-6422
Ext. 1

Support Portal
Any Questions?
Request a Call