How does PGP Endpoint Application Control work? What is the end-user experience?
Once PGP Endpoint Application Control is deployed, its operation is completely transparent. • Background protection: Users continue to work as usual. The software automatically protects against unauthorized and malicious software applications ensuring data protection without requiring user intervention. • Single Sign-on: Integration with Microsoft Active Directory and Novell eDirectory enable users to login with existing credentials, ensuring data protection without burdening the user with remembering additional authentication credentials. • Local authorization: Users have the ability to authorize applications without compromising administrative oversight. Detailed logs and audit trails track all application activity.