Miscellaneous - SYNERSOFT

Miscellaneous

What are the certifications owned by BLACKbox?

BLACKbox has an OEM contract with the hardware manufacturers in Taiwan. We make the hardware as per our sizing and requirements. The assembly of components is also carried out by the OEM suppliers.

BLACKbox is certified by the following institutions:

  1. FCC – USA Environmental Certification
  2. CE – European Union Environmental Certification
  3. BSMI – Taiwan High Risk product compliance
  4. EAC – Export safety Certification for Russia, Belarus and Kazakhstan
  5. CCC – Export safety Certification for China
  6. KC – Export safety Certification for Electrical Products for Korea
  7. VCCI – Compliance with emission (interference) standards in Japan
  8. RCM – Electrical regulator (Regulatory Authorities compliance for Australia
  9. RoHS – Product level compliance based on the European Union’s Directive 2002/95/EC, the Restriction of the Use of certain Hazardous Substances in Electrical and Electronic Equipment
Does BLACKbox have an inbuilt antivirus and firewall software to protect its data from viruses or network attacks?

No. BLACKbox does not have an inbuilt antivirus. It is highly recommended to install the latest updated licensed antivirus on each system.

Antivirus prevents ransomware from entering the network. BLACKbox offers data recovery in case ransomware impacts the data. It does not prevent ransomware attacks.

What level of penetration testing does BLACKbox withstand?

BLACKbox does not have to withstand any penetration testing as it works on the blockchain model.

Once the policies are configured, those configuration settings are replicated by the BLACKbox agent on the client system. Post this, the system has to connect to the BLACKbox only to check if there is any change in the policy. So, after the policy is configured, if the policy server of BLACKbox is down, the policies will still prevail on the system as the endpoint saves the policy data instead of depending on the server.

What steps should be taken before installing the BLACKbox endpoint agent on the user's computer?

The following steps should be taken before the installation of the BLACKbox endpoint agent on the user’s computer:

  1. Ensure that the user’s system is in the Local Area Network(LAN).
  2. Login with a built-in administrator profile.
  3. Disable Windows or licensed antivirus firewall temporarily.
  4. Set the user access control (UAC) to ‘Never Notify’ in the Control l Panel.
  5. Install the required version of JAVA (32/64 bit) on the user’s computer according to the Windows OS.
Does Blackbox have the facility to do the patch assessment and vulnerability management of all the systems (desktops & laptops)?

No.

Can BLACKbox support AWS?

Yes, for cloud backup BLACKbox supports AWS.

Can SharePoint be used for Data Centralization?

No, BLACKbox has its own file server.

Can BLACKbox be used along with thin clients?

Yes, BLACKbox can be used along with thin clients.

How can we verify the login/logout time of a user using BLACKbox?

We have a feature called “Sign-in Timeline” available in BLACKbox, through which we can check the sign-in and sign-out details of each BLACKbox user.

Can the printer access and printed document details be monitored through BLACKbox?

BLACKbox is not a Print Monitoring Tool. However, we can control the users’ access rights to the printer.

Demo

Want to know More?

Ask for Demo





    captcha
    Check

    IT INFRASTRUCTURE AUDIT

    Reality Check Voucher worth INR 20000 NOW FREE

               








      captcha