TF2000 Description

The ComputerProxTM TF2000 automates locking the computer when you are away. The TF2000 uses ultrasound technology to detect your presence. The TF2000 locks the system automatically when you leave the vicinity of the computer. There are no awkward timeout settings that incorrectly lock the computer when you are not there. The TF2000 detects your presence and will not lock it inadvertently. The TF2000 connects to the computer via the USB port. It can be configured by the system just like a keyboard. Commands are sent to the computer as keystrokes, so no drivers are needed. Our configuration tool allows you to configure the individual keystrokes as well as the specified delays. The TF2000 also has a walk-away' sequence that allows keystrokes be sent when you approach the computer. Under Windows XP, the TF2000 sends the CTRL/ALT-DEL sequence to the user when they approach the computer. This allows the user to authenticate by opening the PC.

Pricing

Pricing Starts At:
$79 one-time payment

Integrations

No Integrations at this time

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
ComputerProx
Website:
www.computerprox.com/products/tf2000.htm

Media

Recommended Products
Never Get Blocked Again | Enterprise Web Scraping Icon
Never Get Blocked Again | Enterprise Web Scraping

Enterprise-Grade Proxies • Built-in IP Rotation • 195 Countries • 20K+ Companies Trust Us

Get unrestricted access to public web data with our ethically-sourced proxy network. Automated session management and advanced unblocking handle the hard parts. Scale from 1 to 1M requests with zero blocks. Built for developers with ready-to-use APIs, serverless functions, and complete documentation. Used by 20,000+ companies including Fortune 500s. SOC2 and GDPR compliant.
Get Started

Product Details

Platforms
Windows
Customer Support
Phone Support
Online

TF2000 Features and Options

Computer Security Software

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

TF2000 User Reviews

Write a Review
  • Previous
  • Next