Kavach iTaaS

Kavach iTaaS is a game changer. It provides complete IT stack using Hybrid Cloud.
  It is fully managed.
  It improves productivity.
  You stay safe.
  You can save 30% on your IT costs.

1. Internet features
Proxy/ Web content filter
1. It proxies normally only HTTP connections. It does also support the protocols FTP, Gopher, SSL, and WAIS access control lists
2. Proxy authentication
3. White list domains and urls
4. Blacklist domains and urls
5. Built-in content scanner plug in system which includes AV scanning
6. Limit POST size
7. Blanket SSL blocking so you can block SSL anonymous proxies

EMail server
1. Calendar sharing
2. Meeting request
3. Support Thunderbird, Outlook, and android HTTP connections. It does also support the protocols FTP, Gopher, phone email client.
4. Web based Administration
6. POP3/PoP3s
7. Mail Groups
8. Queue Management
9. Mail redirection
10. Webmail

1. Easy user interface with search, favorites, tags and other ways to quickly get at your files.
2. Preview support for PDF, images, text files, Open Document, Word files and more.
3. Powerful integrated logging
4. Fine-grained control over access to data and sharing capabilities by user and by group.
5. Sharing REST API. Control sharing from mobile apps and desktop clients
6. Document management
7. Controlling File Versions and Aging

CRM(Customer Relationship Management)
1. Real-time Data Sync
2. Single Sign-on
3. Rich Module Support
4. Target List Support
5. Lead Capture Pages
6. Automation & Work flow
7. Profile Analytics
8. Opportunity Reporting
9. Map User Permissions
10. Custom Field Support

1. Automate secondary DNS servers.
2. Plug-in system.
3. NAT IP alias conversion.
4. Round Robin load distribution option.
5. Support for standard dynamic updates.
6. Incremental Zone Transfers.
7. DNSSEC hosting / signing.

2. Security
1. Central, Powerful Management
2. User and Application Control
3. High Availability
4. Plug and Play Deployment
5. Deep Packet Inspection
6. AET Protection(Advanced evasion techniques)
7. Multi-Tenancy
8. Adaptable, Convertible Architecture
9. Virtualization
10. Email Anomaly Detection

1. Management of White lists and Blacklists
2. Subject or Content Filters
3. Virus Detection
4. Auto-spam Detection
5. Email Recovery and Quarantine

Active Directory
1. Provide Domain Services
2. Lightweight Directory Services
3. Can be viewed at a number of levels.
4. Organizational units
5. User Authentication
6. Network data security
7. GPO objects
8. Support replication
9. FSMO roles
10. Software deployment

1. High performance
2. Command-line scanner
3. Milter interface for send mail
4. Advanced database updater with support for scripted updates and digital signatures
5. Virus database updated multiple times per day
6. Built-in support for all standard mail file formats
7. Built-in support for various archive formats, including Zip, RAR, Dmg, Tar, Gzip, Bzip2, OLE2, Cabinet, CHM, BinHex, SIS and others
8. Built-in support for ELF executables and Portable Executable files packed with UPX, FSG, Petite, NsPack, wwpack32, MEW, Upack and obfuscated with SUE, Y0da Cryptor and others
9. FSMO roles
10. Built-in support for popular document.

Vpn ipsec/ssl vpn
1. Layer 2 and Layer 3 VPN:
2. Protecting field workers with the internal firewall
3. Only one port in the firewall must be opened to allow incoming connections
4. No problems with NAT
5. Virtual interfaces allow flexible very specific networking and almost every imaginable firewall rule
6. High flexibility with extensive scripting possibilities
7. Transparent, high-performance support for dynamic IPs
8. Simple installation on any platform
9. Modular Design
10. Support for mobile and embedded
11. Very active community

3. Backups and Reports
1. User control of and access to backups through web interface
2. Support for DHCP and disconnected clients
3. Backup pooling
4. Easy per-client configuration

Log server
1. File Integrity checking
2. Log Monitoring
3. Root kit detection
4. Active response

4. Mail archive
1. Built-in SMTP server
2. STARTTLS support
3. Tcp_wrappers support
4. Virus checking
5. Archiving rules
6. Retention rules
7. Zlib compression
8. Export to EML format
9. Import from PST, EML and mailbox format
10. Import from POP3/IMAP account
11. Blowfish encryption
12. Digital signing and verification
13. Support for DHCP and disconnected clients
14. Backup pooling
15. Easy per-client configuration

1. Simple search
2. Advanced search
3. Save/load search criteria
4. Tagging emails
5. Adding notes to emails
6. View/export/restore of archived emails
7. Log Monitoring
8. Root kit detection
9. Active response

Web interface
1. Access with a browser
2. AD/LDAP authentication
3. Single Sign-on
4. Google OAuth
5. IMAP authentication
6. View/export/restore of archived emails
7. Log Monitoring
8. Root kit detection
9. Active response

Monitoring / Audit
1. Logging of events
2. Search the audit logs
3. Legal hold
4. Status info/chart
5. Alerts

Import / Export
1. Export to EML format
2. Import from PST, EML and mailbox format
3. Import from POP3/IMAP account