SOLUTIONS

CWAT Enterprise Information Protection Solution
CWAT safeguards enterprises against internal threats. By monitoring employee computer activities and restricting unauthorized actions, it provides real-time protection of internal information and prevents harmful behavior. CWAT helps organizations establish a robust information protection and management strategy, thereby securing critical assets and preserving corporate reputation.

Why CWAT?
CWAT is a software solution developed by Intelligent Wave Inc. in Japan, leveraging the company’s extensive expertise in building system infrastructures for the Japanese financial industry. It is designed to prevent information leakage from personal computers.
A key feature of CWAT is its ability to control user operations. It not only monitors and controls file management, but also supervises and restricts computer (user) activities. In addition, CWAT collects detailed log records, including information on security policy violations (alert logs) and user operations (detection logs).
政府
銀行
電商
線上遊戲
影音平台
社群媒體

Real-time Monitoring
- CWAT monitors employees’ computers in real time and blocks actions that violate corporate policies.
- Whether to block or not when a violation occurs can be defined by administrators when configuring security policies.
- In addition to immediately blocking prohibited actions, CWAT also allows for flexible responses, such as monitoring without intervention or issuing a warning to the employee through a pop-up notification.


Log Recording
In addition to recording employee computer activity when a violation of corporate policy occurs, CWAT also logs general user operations, such as launching chat applications or executing files.
Comprehensive Operation Monitoring and Information Protection
Security policies are configured on the CWAT monitoring server and distributed to all employee computers. The CWAT client installed on each computer monitors user activities in real time.
When actions that violate security policies occur, CWAT automatically takes real-time measures such as blocking the operation, displaying pop-up warnings, locking the keyboard, capturing screenshots, sending email notifications to administrators, and generating alerts on the monitoring server.
CWAT provides two types of logs:
Alert Logs – Record operations that violate security policies, used for real-time monitoring of employee computers.
Detection Logs – Record basic computer operations, used for subsequent investigations.

Security Policies
CWAT’s security policies can be flexibly configured from multiple aspects to meet the high internal security requirements of enterprises. The policies consist of 15 items, which can be applied simultaneously to both users and endpoints.















For Enterprise Administrators
The CWAT solution empowers administrators to oversee the usage of employee devices, preventing operational mistakes and reducing both intentional and unintentional risks of corporate data leakage. With its flexible security policies, CWAT allows administrators to adjust settings according to business needs and handle individual incidents in different ways, ensuring the protection of corporate interests.
For Enterprise Employees
Employees may unintentionally cause data leakage during daily work due to lack of awareness or attention, leading to corporate losses or even personal penalties. With CWAT protection, employees can perform their tasks with confidence, as restricted actions are blocked by the system. This reduces the chance of errors and safeguards employees while carrying out their duties.
LATEST NEWS
Master Cybersecurity Trends to Build a Foundation of Competitiveness

Feature One

Feature Two

Feature Three
Strengthen Your Identity Authentication Now
Elevate Enterprise Security Like Never Before
Keypasco is delighted to share more about our exclusive technologies and products with you! Tell us your needs and goals, and let Keypasco deliver the most suitable solution—becoming your dedicated identity authentication technology advisor.
如果您想問技術相關問題 請點我