CrossTec Logo







EMS for Education
Call Us at 800.675.0729 or Chat Live with Us
CrossTec Secure ensures that a computers vital files and systems are protected and offers instantaneous rollback technology that returns the computer to its original state.

As tech usage in schools continues to grow, district IT staffs and classroom teachers face new challenges posed by computer labs and school networks as well as control software deployment and user issues.

In a tech lab environment, often the best way is to experiment. Unfortunately lab computers may be used four or five times a day for different classes, so practical experimentation that may render a system unusable for the next period.

When the hard-disk recovery feature is enabled, all system files and folders will be continuously monitored and, when required, the system will restore back to a previous point in time quickly and transparently. CrossTec Secure's recovery functionality also allows you to specify folders that are excluded from rollback monitoring and, as such, are always preserved. Whether it's a complete software failure requiring total restoration or specific files, the recovery feature provides complete flexibility. Needless to say, system administrators can also install, manage and perform software restoration remotely.

Unlike alternative disk protection systems, CrossTec Secure monitors the disk for changes rather than initially taking a complete snapshot of a computer system. This process results in the almost instantaneous creation and restoration of an image.

Quick Links: Desktop Security | Restore on Reboot
ITAM
CrossTec Secure offers twice the level of desktop security and protection - desktop lockdown and hard disk protection and recovery - in a single and easy-to-use package.

Prevent copying, deletion and renaming of files and folders.

Hide folders and restrict creation of defined file types.

Restrict changes to the desktop, taskbar and system settings.

Restrict shutdown, logoff, lock and password changes.

Protect the operating system and computer settings.

Lock control panels, task manager, command prompt and registry.

Restrict user-defined applications from running.

Restrict available network drives, drive mappings and network neighbourhood.

Prevent access to Windows systems tools.

Prevent web browsers from running.

Restrict creation and deletion of system printers.

Control access to USB and CD/DVD devices.

Either disable USB storage devices, allow read only or prevent application launch.

Prevent users from installing unauthorized software.

Apply policies to all users, or exclude specified accounts.

Share security configurations across a network.

Centrally deploy Secure across your LAN/WAN to all computers.

Centrally manage and update security configurations.

ITAM
Restore on Reboot Features

Instantly restores your hard disk to an earlier point in time.

Offers do-it-yourself disaster recovery.

Helps users stay productive - even if their operating system will not boot.

Rescues and restores lost or damaged files, folders and corrupted programs.

Works with your existing security products such as anti-virus programs.

Provides a secure test platform.

Restrict user-defined applications from running.

Uses minimal system resources and hard drive storage.

Easy to install and centrally manage.