Nodes are any device, PC, MAC, Server, Mobile, and Network devices such as routers, switches, & firewalls. So, if you wish to have your workstations monitored, then each workstation would be a node. You can then add monitoring for the following
Remote Monitoring & Management managed antivirus helps to keep both known and emerging malware off workstations and servers. Our antivirus feature not only stays up to date with the latest threats using traditional signature-based protection, but also protects against new viruses using sophisticated heuristic checks and behavioral scanning. With new threats created each day, businesses can protect themselves by using these proactive methods to help ensure rock solid malware protection.
Risk Intelligence scans for unsecured data across a network—even in persistent storage—and provides an estimated financial figure for an organization’s potential liability in the event of a data breach. This allows you to discover areas for security work with clients, prioritize important security fixes, and even show progress over time. Once you try it, you’ll see how powerful it can be
Web threats have increased over the past few years. From phishing sites to drive-by downloads, the dangers have never been greater. To stay safe, you need to make sure you have advanced malware protection in place along with bandwidth monitoring, content filtering, and more. Remote Monitoring & Management includes built-in web protection that keeps your workforce secure and productive. Byte I.T.’s Remote Monitoring & Management’s web protection goes beyond enterprise antivirus software and firewalls by letting you set your own content-filtering policies, website blacklists, time- and content-based browsing policies, and much more.
Application control allows or blocks the defined applications that try to access system resources on a client computer. You can allow or block access to certain registry keys, files, and folders. You can also define which applications are allowed to run, which applications that cannot be terminated through irregular processes, and which applications can call DLLs.