PEARLSOFT

From Bluecabinet
Revision as of 07:57, 31 December 2013 by Administrator (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
PEARLSOFT
Official Website: http://www.pearlsw.com/
Official about page: http://www.pearlsw.com/about/index.html
Country: Please specify country
Location: Pearl Software, Inc.

64 East Uwchlan Ave.

Suite 230 Exton,

PA 19341 USA

Founded: 1996
Business: Internet Monitoring & Web Filtering Software Solutions
Contact
Phone: (800) 732-7596 (800- PEARL96)
Fax:

Background

Working with Microsoft, Pearl Software was among the first technology companies to conduct testing of advanced Windows OS networking components and became an early entrant in the home Internet filtering industry. As a result of these early research and development activities, Pearl Software created an efficient and reliable means to monitor and control the Internet activity of any Windows user. These capabilities were later extended to the Terminal Server, Citrix and Novell architectures

Products

- Pearl Echo Suite - Website Echo - IM Echo


Pearl Software's products allow you to easily extend your Internet usage policies beyond the company's internal networks. Inappropriate web surfing or illegal transactions over email or IM cannot be circumvented by users going off the corporate network and onto another private network or readily available hot-spot.

Pearl Echo's unique agent-server technology provides administrators with the ability to manage Internet activity on client stations and laptops no matter where those machines are located. Pearl Echo's Mobility Monitor technology can automatically follow users so all of their activity is monitored and access privileges remain governed by the same rules that apply when users are on your private network. In addition, small-and medium-sized businesses are coming under growing pressure to enable their employees to use their personal Smartphones, tablets and other devices for business use. Some 25 percent of companies are already supporting the use of such devices in the workplace. However, 62 percent of businesses have no controls in place to manage these devices, and 45 percent of IT managers are unaware of all the devices being used, raising questions regarding security and privacy. Many companies are shifting or bolstering their server-centric capabilities to supporting and securing disparate devices. Pearl Echo, running in a server-centric environment, can extend your device support and simultaneous provide data leak protection. To see how Pearl Echo can provide the flexibility you need to manage your employees' use of the Internet, view product videos at Pearl's QuickTour. PEARL ECHO SUITE V10.0 The latest release of Pearl Echo Suite v10.0 include enhanced technologies that allow us to provide expanded features at very competitive pricing.

Pearl Software Exhances Internet Monitor Capabilities. Version 10.0 Released 24 March 2011

Major enhancements include:

• Bandwidth Allocation controls. • Controlling access to any application, not just Internet apps. • Daily time usage in order to allocate a block of minutes per day/per application. • File download controls extended beyond FTP to downloads that occur within a browser. • Extended keyword controls including pattern matching. • Extended Block and Allow List controls including port blocking. • And much more...

Version comparison chart: http://www.pearlsw.com/products/upgradeCompare.html

Pearl Echo Suite is an e-communications monitoring, filtering and control solution, enabling effective management of employee Internet usage in mobile, desktop and server-centric environments. Pearl Echo Suite actively captures employee web browsing, file transfers, news, chat, IM, e-mail and web-mail, including all encoded attachments. The software can both monitor and block e-communications based on keywords and phrases, thereby protecting against the loss of confidential information, transmittal of unacceptable content and access to inappropriate web sites. In sensitive environments, Pearl Echo Suite can also be used to restrict user, group or computer access to only approved external and internal sites. Robust reporting delivers timely activity and violation reports to management.

Pearl Echo Suite manages Web, E-mail, Downloads, IM, Chat, Newsgroups, Bandwidth and Application Executables. With the Echo-Filters Category Module you can block access to Web sites based on categories of content like Job Search, Sports, Shopping, etc. Echo-Filters is a comprehensive web URL filtering database, designed to simplify the administration of Internet use. Using the Echo-Filters module, administrators can choose from over forty categories that they wish to block as well as run reports on users accessing web sites in these categories.

Automatic updates to the URL database are done four times an hour as our proprietary search algorithms scour terabytes of Web content each month looking for inappropriate or harmful content including malicious sites that are typically the genesis of most malware applications that infect end-user devices. Don't rely on Anti-Virus software to fight malware after its already made it to the desktop. When Pearl Software scans a site we also download and check for viruses in setup files, zip files and executable files. If viruses are found, the site is added to the Echo-Filters Malware category to prevent a seemingly harmless site from launching a drive-by install of malicious code or providing a fake hardware driver. Data Leak Prevention with Pattern Matching The latest release of Pearl Echo now includes custom textual pattern matching capabilities. This verfsion enhances the products existing Data Leak Prevention capabilities in order to identify custom defined text patterns that flag and block unsanctioned transmission of information like credit cards, social security numbers and company specific sensitive information. Pearl's products already keep an eye on data-in-motion by examining text transmitted in encoded email attachments, blog postings, chat conversations and file transfers. Our latest release improves our existing Data Leak Prevention offering by allowing you to define patterns of characters that need to be flagged for review before being transmitted. Exact and partial keyword matching has always been a strength of Pearl's integrated blocking strategy. With keyword pattern analysis, you can now generalize the information you want to protect in order to broaden your audit capabilities. For example, to block or audit inbound and outbound transmission of social security numbers, you could use the following pattern in your custom Keyword Control List: ###-##-####. This, like many of the features, was the result of a customer suggestion. PEARL ECHO V9.0 Major new enhancements include:

    Support for 64 bit applications.
    Monitoring and Blocking of HTTPS activity by IP address.
    Exchange Controls - "client side" monitoring & control of Exchange Mail including internal and external recipient management.
    Support for Google Chrome.
    Support for Windows Live Messenger 9.0.
    Echo Data Encryption.
    Improved Custom Control List management.
    E-mail direction notification.
    Machine Idle Detection.
    "Phone Home" application detection.
    And much more 

Pearl Echo is an enterprise-class employee Internet monitoring, filtering and control software program designed to monitor and control the Internet activity of multiple PCs and thin clients from a central location. Pearl Echo actively captures employee web browsing, file transfers, news, chat, IM, e-mail and web-mail, including all encoded attachments. Pearl Echo fits the Internet monitoring needs of any Internet setup including those with multiple locations and roaming or mobile Internet users.

Pearl Echo enables organizations to set user-level monitoring and Internet access policies in a client-server, server-centric and peer-to-peer computing environment. Pearl Echo Employee Internet Monitoring, Filtering, and Control software monitors each user's web browsing, file transfers, news, chat, e-mail and instant messaging. Pearl Echo's proven capabilities extend beyond standard Internet mail to include management of Microsoft Exchange mail and Novell Groupwise. Pearl Echo also monitors keywords and phrases to protect against the dissemination of confidential information in web postings, blogs, im, e-mail and even in encoded e-mail attachments

http://www.dbl.co.uk/software/pearl-echo-suite/24/product.php

Countries using products

Reports

Tech & Business Partners

An alliance with Microsoft has been the cornerstone of Pearl Software’s technical direction. Pearl Software’s products tightly integrate into each Microsoft Operating System

Pearl Software has relationships with leading Internet Service Providers like AT&T, Time Warner and Earthlink

Pearl Software’s products have been optimized for Citrix MetaFrames’s resource-conscious environment.


People Responsible

Board Members

Pearl Software President and COO Richard Miller

http://findarticles.com/p/articles/mi_m0EIN/is_2005_August_23/ai_n14928299/

Management Team

Mr. David Fertell

Co-Founder and President

Joe Field

Co-Founder

Mr. Richard Miller

Chief Operating Officer

Ms. Terri Rieber

Director of Sales

Mr. James M. Hackley

Government Sales Sector Manager

Investors

Major Shareholders

Other Info

IP & Servers

PEARLSW.COM SITE INFORMATION IP: 66.250.40.67 IP Location: Washington, United States Website Status: active Server Type: Microsoft-IIS/6.0