New Secure Desktop Version 7 from Visual Automation

Handcrafted Endpoint Security Software for Windows XP and Vista, with specific security features for Internet Explorer and Firefox.

Grand Ledge, MI (PRWEB) November 25, 2008 -- Visual Automation today released an all new version 7 of Secure Desktop that has been significantly re-designed to provide an Endpoint Security solution for Microsoft Windows XP, Vista, Internet Explorer 6 or 7, and Mozilla Firefox 2 or 3. Configuration and user auditing data are now stored in the XML/RSS file format, with new in-dialog help and a completely re-written manual in Adobe PDF format. Over 350 hot-key combinations can now be disabled. Secure Desktop is designed to work with the new UAC (User Access Control) security of Windows Vista. Secure Desktop information is available at Secure Desktop Overview.

For Internet Explorer or Firefox, Secure Desktop 7 can push the browser to full screen mode, disabling menu items and keyboard shortcuts. After a period of inactivity, the browser can automatically reset to the home page, deleting private data in the process. Set an approved web site list. More information about browser specific features can be found at Secure Desktop Browser Security.

Secure Desktop 7 is simply the best version we have ever produced
Many architectural changes were needed to support Windows Vista. Windows XP and Vista customers are getting a great new version of the product.
Secure Desktop is a Windows shell replacement, providing a secure and feature rich method of starting programs and document files. Existing programs and shortcuts can be easily imported. Icons and tabs may be password protected. Programs can be set to run a single instance only, automatically re-started if closed, and Run As Administrator.

User auditing to XML/RSS files is important for the Food and Drug Administration's 21 CFR Part 11 compliance. Secure Desktop logs keystrokes, window titles, URLs, the user name, as well as disk and memory usage. These files are XML RSS 2.0 format, readable by the included sAudit program or any RSS reader.

Over 350 hot-keys can now be disabled. The print screen key, the Windows key, the left mouse button and others can all be disabled for all running programs. Secure Desktop uses a hardware independent approach to keyboard disabling.

Secure Desktop's Window Wizard provides a way to act on another program's window to force it to a maximum or minimum state. Or close it automatically. Or hide it from the user. Full technical specifications can be found at Secure Desktop Technical Specifications.

"Secure Desktop 7 is simply the best version we have ever produced," said Duane Fahey, President and Founder of Visual Automation, Inc. "Many architectural changes were needed to support Windows Vista. Windows XP and Vista customers are getting a great new version of the product."

Visual Automation's web site has been completely re-designed, now written to the XHTML 1.1 standard. New data sheets in the Adobe PDF format are now available as well.

Pricing & Availability

Secure Desktop 7 is available immediately through the Visual Automation Store (Visual Automation Home Page). Price is $195 USD, 5-pack for $700 USD, and 10-pack for $1275 USD. Or $100 USD for an upgrade from a previous version. Site and multi-site licenses are available.

Visual Automation, Inc. is a provider of handcrafted endpoint security software products. Founded in 1994, the privately held company is recognized worldwide as a leader in Windows desktop and browser security. Products include Secure Desktop 7, ColdKey 3, and iLock 3. Companies worldwide depend on Visual Automation products for their endpoint security needs.

Secure Desktop, iLock, and ColdKey are trademarks of Visual Automation, Inc. Windows and Vista are registered trademarks of Microsoft Corporation. Firefox is a registered trademark of the Mozilla Foundation. All other trademarks are property of their respective owners.

Contact:
Duane Fahey
Visual Automation, Inc.
517-622-1850
Visual Automation Home Page

###                                         

Recent Entries

CUPPS: The Platform of the Future (Airline Kiosk)
CUPPS has been architected as the platform of the future, able to accommodate many things even beyond the agent-facing applications…
EMV takes aim at U.S.
Nice article on SecureIDnews covering EMV. by Andy Williams, Associate Editor, Avisian PublicationsLike a massive tidal wave, EMV continues to roll…
Tokenization and Enterprise Security
Nice article on tokenization which also highlights lack of formal standards for tokenization at this time. Credit Card Tokenization: Put All…
Wal-Mart's Kiosk Trial Raises Serious PCI, Data Ownership Issues
Wal-Mart this month became the latest major retailer to experiment with self-service kiosks, selling space in 77 stores for units…
Proximity (NFC) Mobile Payment Technology - Security Whitepaper
The opportunities offered by the advent of proximity mobile payments are clear; differentiated payment services, increased transaction volumes, faster transactions,…
Look Beyond Hospitality Touch Screen Solutions
Whether you realize it or not, touch technology quickly is becoming the intuitive input delivery method of choice. Look no…
Level 4: The small-merchant PCI challenge
While sensational data breaches experienced by big-box retailers and processors fill the headlines, 85 percent of reported data compromises involve…
ATM Card Skimming and Pin Capture
ATM Card Skimming is a method used by criminals to capture data from the magnetic stripe on the back of…
Background - Use of Electronic Health Records in U.S. Hospitals
Report from New England Journal of Medicine on Electronic Health Records. Concludes - very low levels of adoption in U.S.…
PCI DSS in real life -- Requirement 1 Firewall
Excerpt: Critical to the selection was choosing a vendor that best met PCI DSS (Payment Card Industry Data Security Standard)…
User Interface & Content - Can I Use My Website?
Web sites, self-service can play nicely together according to Jim Kruper of Kioware.  With the increasing number of devices that…
Resource Link - Understanding credit card transaction fees
Merchants accounts, gateways and rates. Having your kiosk process credits cards swiped locally (card present) come with regulatory standard considerations…
Whitepaper - Introduction to CFM or Customer Flow Management
CFM or Customer Flow Management systems are found in more verticals/markets than any other application. Here is a technical document…
Compliance Resource: ETA and Electronic Transaction Compliance
Worth noting Heartland Payment Systems and RBS Worldpay have been removed from Visa Inc.'s list of PCI compliant service providers and…
Going beyond current PCI security standards
Acknowledging the need for controls that go beyond those offered by the Payment Card Industry (PCI) Data Security Standard, a senior…
ADA Requirements - Changes in California
In late 2008 the California legislature passed a stronger version of ADA which was Senate Bill 1608. This bill became…
Opinion - Why is Redbox Afraid of the iPhone?
Over the last few years, Redbox has been able to build an impressive DVD rental network by being innovative and…
Research Report - Touchscreen Check-In: Kiosks Speed Hospital Registration
March 2009 -- Patient self-service kiosks are being used with growing frequency in hospital ambulatory settings and emergency departments. These interactive…
Cloud Computing - What is it?
Cloud computing resources question was raised by a member of Health Infomatics group we participate in. Health technology right now…
Heartland Put on Probation for Security Breach
Heartland Payment Systems (HPY), one of the largest credit card processors in North America, is finally being called to the…



  |