PT NETMARKS INDONESIA
Subsidiary of Uniadex, Ltd Japan
We are here, on Customer's side
![Hero Section](https://static.wixstatic.com/media/04cb67_eeda4fa4e8c54a6184d04f82811629a3~mv2.jpg/v1/fill/w_889,h_500,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/04cb67_eeda4fa4e8c54a6184d04f82811629a3~mv2.jpg)
IP-Guard Data Security
IP-Guard Data Loss Prevention
Secure your business from data loss prevention with IP-Guard control system that also has record, control, audit and document encryption function
Reliable and trustworthy to protect your business data anywhere
![Ensure data security illustration](https://static.wixstatic.com/media/04cb67_faa0d0663f3a4960960873ef96d6f159~mv2.webp/v1/fill/w_364,h_226,al_c,q_80,usm_0.66_1.00_0.01,enc_avif,quality_auto/IP-Guard-Page_1__11zon.webp)
Flexibility
Modular System Features
IP-Guard is divided into 17 function modules, generally divided into 3 categories: computer usage recording, control and IT asset control. Corporate can customize IT needs and budget to purchase suitable modules.
Ensure data security
Record. Control. Audit
IP-Guard focuses on the areas where corporate data is most likely to be leaked or lost, by providing record, control and audit functions, all computer usage behavior, including peripherals, can be easily observed.
![IP Guard system features](https://static.wixstatic.com/media/04cb67_26966b85fef34bcbbe744b04665157b8~mv2.webp/v1/fill/w_364,h_206,al_c,q_80,usm_0.66_1.00_0.01,enc_avif,quality_auto/IP-Guard-Page_2__11zon.webp)
Modules
IP-Guards Consist of 17 Modules
![Modules](https://static.wixstatic.com/media/04cb67_8228bac064d44362b1e53d071236ce3d~mv2.png/v1/fill/w_557,h_419,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/Modules.png)
Prevention
Endpoint Data Protection
Business owners want to keep data in original state and it must not be altered or transferred without permission. IP Guard helps business effectively manage the threats and risk to business information, and safeguard what organization value.
![Confidential data that IP Guard could protect](https://static.wixstatic.com/media/04cb67_71eea50bec71479fbf169e5ebb2296a6~mv2.webp/v1/fill/w_249,h_249,al_c,q_80,usm_0.66_1.00_0.01,enc_avif,quality_auto/Data-Loss-Prevention.webp)
Applications
Instant Messaging
Instant message potentially bring data leakage, IP-Guard could secure any threats within instant messaging.
IP-Guard ensure your email are sent and received securely without worry.
Peer-to-Peer
Directly data sending between devices without intermediary potentially bring data leak.
Physical
Copy and Paste
![Copy Paste](https://static.wixstatic.com/media/04cb67_f7868ba314884f078e4c2815cfa40725~mv2.png/v1/fill/w_28,h_25,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/IP-Guard-Page-_1__edited.png)
Data transfer between device through copy and paste could possibly threaten company data.
![USB drive vector](https://static.wixstatic.com/media/04cb67_79e91486559243ee9f4998c6f16964c6~mv2.png/v1/fill/w_16,h_29,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/IP%20Guard%20Page_edited.png)
USB Drive
The USB Drive could bring internal data outside, company should be aware of their data.
Printer
![IP Guard could secure printer system from data leakage](https://static.wixstatic.com/media/04cb67_ab786b256831461781246668fd289d42~mv2.png/v1/crop/x_32,y_0,w_473,h_393/fill/w_30,h_25,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/IP-Guard-Page-_1__edited.png)
Printed data could misappropriated if company doesn't correctly control access.
Network
![File transfer protocol IP Guard vector](https://static.wixstatic.com/media/04cb67_1f88f6eab7fa4b4a9bacbf277fb12a47~mv2.png/v1/fill/w_33,h_40,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/IP%20Guard%20Page_edited.png)
File Transfer Protocol (FTP)
FTP often to be the media to transfer files, but can be a potential pathway for the data leakage.
![IP Guard protect from unwanted Wi-Fi connection](https://static.wixstatic.com/media/04cb67_6a0274c54d8d45cb893574861c692dfb~mv2.png/v1/crop/x_40,y_0,w_594,h_493/fill/w_30,h_25,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/IP%20Guard%20Page_edited.png)
Wi-Fi
Wi-Fi is vulnerable target of numerous threats so company must control the wi-fi access.
HTTPS
![IP Guard secure data sending from HTTPS or directly](https://static.wixstatic.com/media/04cb67_cda8f73448064ac5a1ec70457ad3abd3~mv2.png/v1/fill/w_34,h_29,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/IP%20Guard%20Page_edited.png)
Directly data sending between devices without intermediary potentially bring data leak.
Why IP Guard
Comprehensive Data Protection
IP-Guard assist your company to prevent:
Data Leakage
IP-Guard can effectively stop data leakage, which is the potential disclosure of sensitive company information to unauthorized parties.
Malware
IP-Guard assists in protecting devices from malicious malware that can damage or infect computer systems.
System Performance
IP-Guard is effective in optimizing and monitoring endpoint system performance, ensuring that the system operates at peak efficiency.
Productivity
IP-Guard helps companies manage application usage and resources in a way that boosts productivity while ensuring data security
![IP-Guard Comprehensive Protection](https://static.wixstatic.com/media/04cb67_8cb19490dec24beea6f5518e6d93d86e~mv2.png/v1/crop/x_764,y_0,w_1134,h_1080/fill/w_355,h_338,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/IP%20Guard%20Page%20(1).png)
![IP Guard Characteristics](https://static.wixstatic.com/media/04cb67_ed9d0ce6b607440a806d803ad0c6f478~mv2.webp/v1/fill/w_600,h_338,al_c,q_80,usm_0.66_1.00_0.01,enc_avif,quality_auto/Characteristic.webp)
IP Guard Features
IP-Guard Characteristics
Total Control for User Behavior
Manage endpoint workstation operation activities, software and hardware assets, remote control and maintenance with just one console.
Statistics and Reports View
It automatically analyzes the workstation usage of each endpoint and provides various statistics and reports. Reports include updated Windows information, Windows vulnerability and software license information.
Comperhensive record and log automation
Comprehensive Record and log automation Record a wide range of endpoint workstation operations and activities based on the policy applied. Endpoint workstation software and hardware asset changes and screen history are also included.
Administrator
System Management
IP Guard Multi-Screen Monitoring
View up to 16 end-user screen at once and auto switch between end user screens.
IP Guard Comprehensive Control
Over 29 system related setting or function related privileges
*Support Citrix / MS Terminal
![IP Guard Multi-Screen Monitoring](https://static.wixstatic.com/media/04cb67_6fc58f38b0214ebca4a5c25703617b9d~mv2.webp/v1/fill/w_395,h_294,al_c,q_80,usm_0.66_1.00_0.01,enc_avif,quality_auto/Screen%20Shot%202024-06-13%20at%2022_26_28.webp)
![IP Guard Comprehensive Control](https://static.wixstatic.com/media/04cb67_c005465a311b4b3d8480b3acec6d66db~mv2.webp/v1/fill/w_395,h_297,al_c,q_80,usm_0.66_1.00_0.01,enc_avif,quality_auto/Comprehensive%20Control.webp)