The software provides for:
- Identification, authentication and access control to system and its components
- Data flow management
- Processes recording and logging
- Media recordkeeping
- Cleaning (zeroing, impersonation) of disposed RAM areas of PCs and external drives
- Attacks alarm
- Software and processed data integrity maintaining
- Data protection administrator (service) availability
- Periodic testing of data protection facilities
- Availability of data protection facilities recovery tools